General

  • Target

    f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33

  • Size

    12KB

  • Sample

    240522-yq3tjaee94

  • MD5

    662e92bda0142a38ed777f475d431a25

  • SHA1

    a3890d18e882d5efc273825493a572a8e78946f9

  • SHA256

    f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33

  • SHA512

    6d392b4f8956d970b2c9ac9cd7c3d26e6f76b1fad82bc273adc02edb37947614462f54014b73de9f4ab9e93eaedf318e189869f353abb2707cba2ee8565f73fc

  • SSDEEP

    192:nBL29RBzDzeobchBj8JONmON4nruurEPEjr7AhN:R29jnbcvYJObMuuvr7CN

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33

    • Size

      12KB

    • MD5

      662e92bda0142a38ed777f475d431a25

    • SHA1

      a3890d18e882d5efc273825493a572a8e78946f9

    • SHA256

      f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33

    • SHA512

      6d392b4f8956d970b2c9ac9cd7c3d26e6f76b1fad82bc273adc02edb37947614462f54014b73de9f4ab9e93eaedf318e189869f353abb2707cba2ee8565f73fc

    • SSDEEP

      192:nBL29RBzDzeobchBj8JONmON4nruurEPEjr7AhN:R29jnbcvYJObMuuvr7CN

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks