General

  • Target

    2caad7d4d92ea157e02aea6b38487da1ed12c79602cc3b8efc5b430ddcb485cb

  • Size

    12KB

  • Sample

    240522-xxx17add35

  • MD5

    aa9039f1fef318e497a10ff3d5d0719a

  • SHA1

    adda85029cc63aa03156d013194eda623a0dacf5

  • SHA256

    2caad7d4d92ea157e02aea6b38487da1ed12c79602cc3b8efc5b430ddcb485cb

  • SHA512

    18e2bb29013efb92421ce7e31e6e5a72d1f6911f0f858f97cef8b17313b05175dda0cc4850fd2f42696e0bf0b62defd2c8b33d1347962ed191154afef5f1d5cf

  • SSDEEP

    192:pL29RBzDzeobchBj8JONvONMru5rEPEjr7AhQ:J29jnbcvYJO0Ou5vr7CQ

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      2caad7d4d92ea157e02aea6b38487da1ed12c79602cc3b8efc5b430ddcb485cb

    • Size

      12KB

    • MD5

      aa9039f1fef318e497a10ff3d5d0719a

    • SHA1

      adda85029cc63aa03156d013194eda623a0dacf5

    • SHA256

      2caad7d4d92ea157e02aea6b38487da1ed12c79602cc3b8efc5b430ddcb485cb

    • SHA512

      18e2bb29013efb92421ce7e31e6e5a72d1f6911f0f858f97cef8b17313b05175dda0cc4850fd2f42696e0bf0b62defd2c8b33d1347962ed191154afef5f1d5cf

    • SSDEEP

      192:pL29RBzDzeobchBj8JONvONMru5rEPEjr7AhQ:J29jnbcvYJO0Ou5vr7CQ

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks