General

  • Target

    edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23

  • Size

    12KB

  • Sample

    240522-z2b1magh3v

  • MD5

    222895bb8b7f8c6dfc0f6ab4216378f8

  • SHA1

    9e61672b1ba083197d40fda156ed8a7fe360e50d

  • SHA256

    edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23

  • SHA512

    5455140f3b23941ea98ae8634004d4f54130f42bd5e1f35ce4309606e2522ece9257a9b04111c76635e24dfa81a707da8f69ed8d5a821c310ffb0d8f32deaa84

  • SSDEEP

    192:lL29RBzDzeobchBj8JONEONSruErEPEjr7Ahv:d29jnbcvYJO98uEvr7Cv

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23

    • Size

      12KB

    • MD5

      222895bb8b7f8c6dfc0f6ab4216378f8

    • SHA1

      9e61672b1ba083197d40fda156ed8a7fe360e50d

    • SHA256

      edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23

    • SHA512

      5455140f3b23941ea98ae8634004d4f54130f42bd5e1f35ce4309606e2522ece9257a9b04111c76635e24dfa81a707da8f69ed8d5a821c310ffb0d8f32deaa84

    • SSDEEP

      192:lL29RBzDzeobchBj8JONEONSruErEPEjr7Ahv:d29jnbcvYJO98uEvr7Cv

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks