General

  • Target

    f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1

  • Size

    12KB

  • Sample

    240522-y9rwdafd6z

  • MD5

    414797251bcc0b0c3cdd0b6bcb4e1a38

  • SHA1

    dbdf50c20d9345e7633fc41072b6e32b5c1e012f

  • SHA256

    f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1

  • SHA512

    f2532611529d9b28c9a2e6fd63e619fcf98961d53d069acd30b71f5ac294d90bd2a091e7218da6d1c9552eaa744c249b25553c28bc9946c9f156f9f8d5c1fff1

  • SSDEEP

    192:FL29RBzDzeobchBj8JONRONVP0sTrucrEPEjr7AhTa:929jnbcvYJOOXP0s/ucvr7Cm

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1

    • Size

      12KB

    • MD5

      414797251bcc0b0c3cdd0b6bcb4e1a38

    • SHA1

      dbdf50c20d9345e7633fc41072b6e32b5c1e012f

    • SHA256

      f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1

    • SHA512

      f2532611529d9b28c9a2e6fd63e619fcf98961d53d069acd30b71f5ac294d90bd2a091e7218da6d1c9552eaa744c249b25553c28bc9946c9f156f9f8d5c1fff1

    • SSDEEP

      192:FL29RBzDzeobchBj8JONRONVP0sTrucrEPEjr7AhTa:929jnbcvYJOOXP0s/ucvr7Cm

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks