General

  • Target

    aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d

  • Size

    12KB

  • Sample

    240522-yrywzaee2w

  • MD5

    6e41142ca70f1522569c9027d17da4d4

  • SHA1

    e37b58e2f87ad477859dd3f5ccdc890edcb5598a

  • SHA256

    aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d

  • SHA512

    20dd343e9f458087e9c34734960063c3cf658c71adf148be4001200b63c11cc56648d6a0fcb7319b055c946021df9f5574cd6ac0fbf45e829f662677e1aecb98

  • SSDEEP

    192:sL29RBzDzeobchBj8JONqONnv/mruArEPEjr7AhR:C29jnbcvYJOndSuAvr7CR

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d

    • Size

      12KB

    • MD5

      6e41142ca70f1522569c9027d17da4d4

    • SHA1

      e37b58e2f87ad477859dd3f5ccdc890edcb5598a

    • SHA256

      aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d

    • SHA512

      20dd343e9f458087e9c34734960063c3cf658c71adf148be4001200b63c11cc56648d6a0fcb7319b055c946021df9f5574cd6ac0fbf45e829f662677e1aecb98

    • SSDEEP

      192:sL29RBzDzeobchBj8JONqONnv/mruArEPEjr7AhR:C29jnbcvYJOndSuAvr7CR

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks