General

  • Target

    86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d

  • Size

    12KB

  • Sample

    240522-xyt1xsdc7y

  • MD5

    e65fd019137e3d18f60947d9ce89cae9

  • SHA1

    1451e2ed4d83d19685f6ca7aa7a861a2efd46c2b

  • SHA256

    86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d

  • SHA512

    da8fbdd76ba8d47004928013ee52cec689beb0bdbaf98b52e3c9e392c3a9d8c11ca830b9a6f8caf8634b7c3c2f0299b92b87f9728fb0b5fa59abecb346f9412f

  • SSDEEP

    192:+L29RBzDzeobchBj8JONLONwwuruwrEPEjr7AhM:w29jnbcvYJOcCwquwvr7CM

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d

    • Size

      12KB

    • MD5

      e65fd019137e3d18f60947d9ce89cae9

    • SHA1

      1451e2ed4d83d19685f6ca7aa7a861a2efd46c2b

    • SHA256

      86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d

    • SHA512

      da8fbdd76ba8d47004928013ee52cec689beb0bdbaf98b52e3c9e392c3a9d8c11ca830b9a6f8caf8634b7c3c2f0299b92b87f9728fb0b5fa59abecb346f9412f

    • SSDEEP

      192:+L29RBzDzeobchBj8JONLONwwuruwrEPEjr7AhM:w29jnbcvYJOcCwquwvr7CM

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks