General

  • Target

    a1dbf3c71b36e66e02becd42199e32892109351099fb353218fccc1166f6d29c

  • Size

    12KB

  • Sample

    240522-yv1vqseg89

  • MD5

    c20a3e1c0b91e382d343384848e76c3e

  • SHA1

    a0608c41c5129c8d0e060721be7daf9df47254ac

  • SHA256

    a1dbf3c71b36e66e02becd42199e32892109351099fb353218fccc1166f6d29c

  • SHA512

    be88bb49f993e3e4ef587a0ff4e20810d18b0c50c40e09774fdeb75e642cd5e9ae429aedb3c3ce141fa3053273445b2c306b21fc577378b2a2c6a22eabfd3a6a

  • SSDEEP

    192:0L29RBzDzeobchBj8JONKONarujrEPEjr7AhB:629jnbcvYJOnUujvr7CB

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a1dbf3c71b36e66e02becd42199e32892109351099fb353218fccc1166f6d29c

    • Size

      12KB

    • MD5

      c20a3e1c0b91e382d343384848e76c3e

    • SHA1

      a0608c41c5129c8d0e060721be7daf9df47254ac

    • SHA256

      a1dbf3c71b36e66e02becd42199e32892109351099fb353218fccc1166f6d29c

    • SHA512

      be88bb49f993e3e4ef587a0ff4e20810d18b0c50c40e09774fdeb75e642cd5e9ae429aedb3c3ce141fa3053273445b2c306b21fc577378b2a2c6a22eabfd3a6a

    • SSDEEP

      192:0L29RBzDzeobchBj8JONKONarujrEPEjr7AhB:629jnbcvYJOnUujvr7CB

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks