General

  • Target

    382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee

  • Size

    12KB

  • Sample

    240522-xvzf8sdc76

  • MD5

    545e8949e7aad7feada494f2958c53b3

  • SHA1

    cf35bd96fd36db6a56b2dfb0fa7b15bb19fc47d2

  • SHA256

    382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee

  • SHA512

    cf242edffe1ae3feb0e8d9c031512fbe72b42125184f5cf2fe6b31ffb258ec8c2385bd9d3bbdfe9d4292815d8c34e157727952b5a3d84cd80313485dd008ff1b

  • SSDEEP

    192:hL29RBzDzeobchBj8JONhONZPELruerEPEjr7Ah+:x29jnbcvYJO2Wuevr7C+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee

    • Size

      12KB

    • MD5

      545e8949e7aad7feada494f2958c53b3

    • SHA1

      cf35bd96fd36db6a56b2dfb0fa7b15bb19fc47d2

    • SHA256

      382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee

    • SHA512

      cf242edffe1ae3feb0e8d9c031512fbe72b42125184f5cf2fe6b31ffb258ec8c2385bd9d3bbdfe9d4292815d8c34e157727952b5a3d84cd80313485dd008ff1b

    • SSDEEP

      192:hL29RBzDzeobchBj8JONhONZPELruerEPEjr7Ah+:x29jnbcvYJO2Wuevr7C+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks