General

  • Target

    9746388d97cc40976b688826c52bd7841642ddee1fa39c75237f35a6ccd5fe64

  • Size

    12KB

  • Sample

    240522-xvrfmadb5w

  • MD5

    4778b0bea934cf9167e62e5190581d2d

  • SHA1

    8e7a7925d5927bc4a9c642c9ec5681f8aeb1dae0

  • SHA256

    9746388d97cc40976b688826c52bd7841642ddee1fa39c75237f35a6ccd5fe64

  • SHA512

    33e802b8d07ea7a27cc3bddaedfae43c2a833b4b80a021d8fcc37382f213ae6efe33503a35d6643337e2020f4e11789710fdeb97a9450fab5f86058129c25fa7

  • SSDEEP

    192:7rL29RBzDzeobchBj8JONtONvyq/GruTrEPEjr7Ahr2:r29jnbcvYJOOYqquTvr7CK

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      9746388d97cc40976b688826c52bd7841642ddee1fa39c75237f35a6ccd5fe64

    • Size

      12KB

    • MD5

      4778b0bea934cf9167e62e5190581d2d

    • SHA1

      8e7a7925d5927bc4a9c642c9ec5681f8aeb1dae0

    • SHA256

      9746388d97cc40976b688826c52bd7841642ddee1fa39c75237f35a6ccd5fe64

    • SHA512

      33e802b8d07ea7a27cc3bddaedfae43c2a833b4b80a021d8fcc37382f213ae6efe33503a35d6643337e2020f4e11789710fdeb97a9450fab5f86058129c25fa7

    • SSDEEP

      192:7rL29RBzDzeobchBj8JONtONvyq/GruTrEPEjr7Ahr2:r29jnbcvYJOOYqquTvr7CK

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks