General

  • Target

    33605135c57ba57d54cb344fb77b98c1ea978e7c1afd45612c1292f8ddc0aa1d

  • Size

    12KB

  • Sample

    240522-yvst5aef4y

  • MD5

    6c33730814c12dbc33f6bb78aefef17d

  • SHA1

    ea59916291b746e072b38083f1c3d22e630c6c46

  • SHA256

    33605135c57ba57d54cb344fb77b98c1ea978e7c1afd45612c1292f8ddc0aa1d

  • SHA512

    46c124ff3d7adee7c6b3480084a376f9180e4300c001086871e7e99bc66c0213aa53e6dcc8df319ede002a2c422f8eaf1d225d9d97bd417772ddab87beda9db6

  • SSDEEP

    192:OL29RBzDzeobchBj8JONYONsBruOrEPEjr7Ahb:A29jnbcvYJOx6RuOvr7Cb

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      33605135c57ba57d54cb344fb77b98c1ea978e7c1afd45612c1292f8ddc0aa1d

    • Size

      12KB

    • MD5

      6c33730814c12dbc33f6bb78aefef17d

    • SHA1

      ea59916291b746e072b38083f1c3d22e630c6c46

    • SHA256

      33605135c57ba57d54cb344fb77b98c1ea978e7c1afd45612c1292f8ddc0aa1d

    • SHA512

      46c124ff3d7adee7c6b3480084a376f9180e4300c001086871e7e99bc66c0213aa53e6dcc8df319ede002a2c422f8eaf1d225d9d97bd417772ddab87beda9db6

    • SSDEEP

      192:OL29RBzDzeobchBj8JONYONsBruOrEPEjr7Ahb:A29jnbcvYJOx6RuOvr7Cb

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks