General

  • Target

    787f739ff85fd7953350e9da0c75c5962a9e13874bbf0f274ab83504f949577f

  • Size

    12KB

  • Sample

    240522-yjztaseb8t

  • MD5

    9adc1093682b3f27b61e728775527d88

  • SHA1

    5a304cfdbb08c3af466d60c22226d8eb968304c7

  • SHA256

    787f739ff85fd7953350e9da0c75c5962a9e13874bbf0f274ab83504f949577f

  • SHA512

    54ca8305bf01ac07666086f0563fb57a6ff352940b74cb76461956d5ac0af0a53ad6734ced6b8572f2f1b1ccbe07509877d0d07a759319b653ea24c9791650d3

  • SSDEEP

    192:GL29RBzDzeobchBj8JONhONzru2IrEPEjr7AhTy:o29jnbcvYJOKxubvr7Cu

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      787f739ff85fd7953350e9da0c75c5962a9e13874bbf0f274ab83504f949577f

    • Size

      12KB

    • MD5

      9adc1093682b3f27b61e728775527d88

    • SHA1

      5a304cfdbb08c3af466d60c22226d8eb968304c7

    • SHA256

      787f739ff85fd7953350e9da0c75c5962a9e13874bbf0f274ab83504f949577f

    • SHA512

      54ca8305bf01ac07666086f0563fb57a6ff352940b74cb76461956d5ac0af0a53ad6734ced6b8572f2f1b1ccbe07509877d0d07a759319b653ea24c9791650d3

    • SSDEEP

      192:GL29RBzDzeobchBj8JONhONzru2IrEPEjr7AhTy:o29jnbcvYJOKxubvr7Cu

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks