General

  • Target

    4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092

  • Size

    12KB

  • Sample

    240522-y49h8sfc65

  • MD5

    65ca2b881b48edcc5d49a54b1bc2b703

  • SHA1

    9641ff17e210fad862d079ee8e5f2564f0914a8f

  • SHA256

    4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092

  • SHA512

    2d54f7bb4898b63fbae0aa91b93d0647e9807fb935399d269726266555b3e1ab1051d7e5c2f0c4c81e947d0e7d0033e747d8ce8b019f771927b177ec3911c6ec

  • SSDEEP

    192:hL29RBzDzeobchBj8JONRONlkGru2rEPEjr7Ahm:x29jnbcvYJOOzkyu2vr7Cm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092

    • Size

      12KB

    • MD5

      65ca2b881b48edcc5d49a54b1bc2b703

    • SHA1

      9641ff17e210fad862d079ee8e5f2564f0914a8f

    • SHA256

      4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092

    • SHA512

      2d54f7bb4898b63fbae0aa91b93d0647e9807fb935399d269726266555b3e1ab1051d7e5c2f0c4c81e947d0e7d0033e747d8ce8b019f771927b177ec3911c6ec

    • SSDEEP

      192:hL29RBzDzeobchBj8JONRONlkGru2rEPEjr7Ahm:x29jnbcvYJOOzkyu2vr7Cm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks