General

  • Target

    eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5

  • Size

    12KB

  • Sample

    240522-xpwhdsda59

  • MD5

    9201d79ee99e0629dba0d1ee8cbad7b3

  • SHA1

    562902dc98f5f74e8fe9a8d43ff44212df1f2a19

  • SHA256

    eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5

  • SHA512

    80929a58e9c8ac612f7fc7ac8d73c0fbd8f98746d45270d94fe54e6147f0dbb12eb2ab13945b39b92c8dc405e7b2b9e831751d46522e472538fe141576985f53

  • SSDEEP

    192:BL29RBzDzeobchBj8JONmONGSru2rEPEjr7Ahd:R29jnbcvYJOjDu2vr7Cd

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5

    • Size

      12KB

    • MD5

      9201d79ee99e0629dba0d1ee8cbad7b3

    • SHA1

      562902dc98f5f74e8fe9a8d43ff44212df1f2a19

    • SHA256

      eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5

    • SHA512

      80929a58e9c8ac612f7fc7ac8d73c0fbd8f98746d45270d94fe54e6147f0dbb12eb2ab13945b39b92c8dc405e7b2b9e831751d46522e472538fe141576985f53

    • SSDEEP

      192:BL29RBzDzeobchBj8JONmONGSru2rEPEjr7Ahd:R29jnbcvYJOjDu2vr7Cd

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks