General

  • Target

    12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5

  • Size

    12KB

  • Sample

    240522-z4ymeahb43

  • MD5

    b08122fb27cda34d886038b6ec8a1906

  • SHA1

    62f2e27b954e3a99795cb7f0400c97885a52368b

  • SHA256

    12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5

  • SHA512

    d3b984be639b0f21cb29ff5e0899b2dd8e6572be4cd6266d6ab991902a8439fcc726a9c7414f90e8d30916e30865d3c7188fa7ecad7ec05a0c772eed5b6bbada

  • SSDEEP

    192:rL29RBzDzeobchBj8JONTONAtrukrEPEjr7Ahk:X29jnbcvYJOw61ukvr7Ck

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5

    • Size

      12KB

    • MD5

      b08122fb27cda34d886038b6ec8a1906

    • SHA1

      62f2e27b954e3a99795cb7f0400c97885a52368b

    • SHA256

      12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5

    • SHA512

      d3b984be639b0f21cb29ff5e0899b2dd8e6572be4cd6266d6ab991902a8439fcc726a9c7414f90e8d30916e30865d3c7188fa7ecad7ec05a0c772eed5b6bbada

    • SSDEEP

      192:rL29RBzDzeobchBj8JONTONAtrukrEPEjr7Ahk:X29jnbcvYJOw61ukvr7Ck

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks