General

  • Target

    1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd

  • Size

    12KB

  • Sample

    240522-xplm7ach6y

  • MD5

    662ed81d78b491febe0d37968c40e0b6

  • SHA1

    d9815f60a72425d0253799bcb1a7b9a7abab5628

  • SHA256

    1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd

  • SHA512

    59f9d6d68a492777948f730f1dff50183f35445c5d44580f049e40e4a6965a36ec42cebb006d6910e2754d7d0f9ddf00cb208c60584320f79a12c5a03bba0e4f

  • SSDEEP

    192:JL29RBzDzeobchBj8JONEONrrubrEPEjr7AhP:p29jnbcvYJOhJubvr7CP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd

    • Size

      12KB

    • MD5

      662ed81d78b491febe0d37968c40e0b6

    • SHA1

      d9815f60a72425d0253799bcb1a7b9a7abab5628

    • SHA256

      1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd

    • SHA512

      59f9d6d68a492777948f730f1dff50183f35445c5d44580f049e40e4a6965a36ec42cebb006d6910e2754d7d0f9ddf00cb208c60584320f79a12c5a03bba0e4f

    • SSDEEP

      192:JL29RBzDzeobchBj8JONEONrrubrEPEjr7AhP:p29jnbcvYJOhJubvr7CP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks