General

  • Target

    68ebcf54b369acb974b8bf8221aea57685ed72a98b9737c38a807afe3300141d

  • Size

    12KB

  • Sample

    240522-xkezvach26

  • MD5

    dfe7b4379f83715a819ee57742034702

  • SHA1

    34a50180324f6601b6ca211843f9574d99521372

  • SHA256

    68ebcf54b369acb974b8bf8221aea57685ed72a98b9737c38a807afe3300141d

  • SHA512

    766d3ef6ff38ba5999564b103ec43893d95c00039b5b4b606ca48cdf1606338ad6c153b63ddd1be3068b269cf35ea7cdde14bc492a7d7a83301482a00dd89616

  • SSDEEP

    192:5L29RBzDzeobchBj8JONhONRruOrEPEjr7AhO:Z29jnbcvYJO2LuOvr7CO

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      68ebcf54b369acb974b8bf8221aea57685ed72a98b9737c38a807afe3300141d

    • Size

      12KB

    • MD5

      dfe7b4379f83715a819ee57742034702

    • SHA1

      34a50180324f6601b6ca211843f9574d99521372

    • SHA256

      68ebcf54b369acb974b8bf8221aea57685ed72a98b9737c38a807afe3300141d

    • SHA512

      766d3ef6ff38ba5999564b103ec43893d95c00039b5b4b606ca48cdf1606338ad6c153b63ddd1be3068b269cf35ea7cdde14bc492a7d7a83301482a00dd89616

    • SSDEEP

      192:5L29RBzDzeobchBj8JONhONRruOrEPEjr7AhO:Z29jnbcvYJO2LuOvr7CO

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks