General

  • Target

    6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0

  • Size

    12KB

  • Sample

    240522-ylsg1aed53

  • MD5

    435c2cb51a3ef179fc898a1cdc837840

  • SHA1

    f18d15608f54d034de1ce18774f75efacadff91b

  • SHA256

    6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0

  • SHA512

    902749470883af15247f41803c3e1900c9d3d4289b839d08152505c32ab9c435c85554013e4ecd2fe42f9c7cd022bca4aed00a08cd6496cbe75dc7f96b6e618f

  • SSDEEP

    192:nL29RBzDzeobchBj8JON/ONpruzrEPEjr7AhA:L29jnbcvYJOkHuzvr7CA

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0

    • Size

      12KB

    • MD5

      435c2cb51a3ef179fc898a1cdc837840

    • SHA1

      f18d15608f54d034de1ce18774f75efacadff91b

    • SHA256

      6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0

    • SHA512

      902749470883af15247f41803c3e1900c9d3d4289b839d08152505c32ab9c435c85554013e4ecd2fe42f9c7cd022bca4aed00a08cd6496cbe75dc7f96b6e618f

    • SSDEEP

      192:nL29RBzDzeobchBj8JON/ONpruzrEPEjr7AhA:L29jnbcvYJOkHuzvr7CA

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks