General

  • Target

    6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929

  • Size

    12KB

  • Sample

    240522-xqcrnsda74

  • MD5

    6bd0a5bc3ce49df751d187d6879f6ff3

  • SHA1

    4e66b13da6c1013769d676193e629d7a84c6c5cb

  • SHA256

    6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929

  • SHA512

    993357d765726aa3e314452cfb4ccb534e426d81becde276b9aae5212c572c0986a1f0c831898f9edf1798a52bf07fe90c751c477ef473837591115b72c7b8e6

  • SSDEEP

    192:JL29RBzDzeobchBj8JONHONsruSrEPEjr7AhY:p29jnbcvYJOYGuSvr7CY

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929

    • Size

      12KB

    • MD5

      6bd0a5bc3ce49df751d187d6879f6ff3

    • SHA1

      4e66b13da6c1013769d676193e629d7a84c6c5cb

    • SHA256

      6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929

    • SHA512

      993357d765726aa3e314452cfb4ccb534e426d81becde276b9aae5212c572c0986a1f0c831898f9edf1798a52bf07fe90c751c477ef473837591115b72c7b8e6

    • SSDEEP

      192:JL29RBzDzeobchBj8JONHONsruSrEPEjr7AhY:p29jnbcvYJOYGuSvr7CY

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks