General

  • Target

    5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d

  • Size

    12KB

  • Sample

    240522-ywwmeaeh48

  • MD5

    c309340e70edde1973ad3a93abedefed

  • SHA1

    569c950194c239fc62223c55bc18f1fb49491764

  • SHA256

    5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d

  • SHA512

    7075d6e7bb449a8a5b2d2fd5fd029bd357b872c0f65ab79079198f04886c6b4c286ad76e413ba4d2da268fd1bf6137b6ae95ce6f01ce5e4cda841035b88f334c

  • SSDEEP

    192:7YL29RBzDzeobchBj8JONSONsru6rEPEjr7Ahp:a29jnbcvYJOvyu6vr7Cp

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d

    • Size

      12KB

    • MD5

      c309340e70edde1973ad3a93abedefed

    • SHA1

      569c950194c239fc62223c55bc18f1fb49491764

    • SHA256

      5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d

    • SHA512

      7075d6e7bb449a8a5b2d2fd5fd029bd357b872c0f65ab79079198f04886c6b4c286ad76e413ba4d2da268fd1bf6137b6ae95ce6f01ce5e4cda841035b88f334c

    • SSDEEP

      192:7YL29RBzDzeobchBj8JONSONsru6rEPEjr7Ahp:a29jnbcvYJOvyu6vr7Cp

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks