General

  • Target

    f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3

  • Size

    12KB

  • Sample

    240522-y5xk3afc88

  • MD5

    2a8b603d6c802cb45152f7dc80cc22c4

  • SHA1

    1a99bfd8e4f699c27666ea26545f7551f652030e

  • SHA256

    f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3

  • SHA512

    2d8d5b0c1e26f6f38f74be8b50d6bf1776a921fe1248820952da4e0ea0da1b6978fb56fdd6666b3ce61b6740bc2fbfc0cf3cb23025950a2dcf88da7ec4b59081

  • SSDEEP

    192:CL29RBzDzeobchBj8JONn+ON1kIrusrEPEjr7Ah9:c29jnbcvYJOznkQusvr7C9

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3

    • Size

      12KB

    • MD5

      2a8b603d6c802cb45152f7dc80cc22c4

    • SHA1

      1a99bfd8e4f699c27666ea26545f7551f652030e

    • SHA256

      f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3

    • SHA512

      2d8d5b0c1e26f6f38f74be8b50d6bf1776a921fe1248820952da4e0ea0da1b6978fb56fdd6666b3ce61b6740bc2fbfc0cf3cb23025950a2dcf88da7ec4b59081

    • SSDEEP

      192:CL29RBzDzeobchBj8JONn+ON1kIrusrEPEjr7Ah9:c29jnbcvYJOznkQusvr7C9

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks