General

  • Target

    ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089

  • Size

    12KB

  • Sample

    240522-yxq4baeg4t

  • MD5

    1cb01e40bcc86bd8a1e78551460f85a3

  • SHA1

    7df567cb9972a458a169926dfc5241f49f77dba5

  • SHA256

    ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089

  • SHA512

    2aaa7b951ff87220e2f3a490ce4001edae1a95cd78963262d75dc8cf90c27856428907f533e6fa0ddeb0d4daca9c112dd1d93b1fec3a08088dfc4b38ddeb21a0

  • SSDEEP

    192:QL29RBzDzeobchBj8JON2ONXrru0rEPEjr7AhF:+29jnbcvYJOfBHu0vr7CF

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089

    • Size

      12KB

    • MD5

      1cb01e40bcc86bd8a1e78551460f85a3

    • SHA1

      7df567cb9972a458a169926dfc5241f49f77dba5

    • SHA256

      ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089

    • SHA512

      2aaa7b951ff87220e2f3a490ce4001edae1a95cd78963262d75dc8cf90c27856428907f533e6fa0ddeb0d4daca9c112dd1d93b1fec3a08088dfc4b38ddeb21a0

    • SSDEEP

      192:QL29RBzDzeobchBj8JON2ONXrru0rEPEjr7AhF:+29jnbcvYJOfBHu0vr7CF

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks