General

  • Target

    8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb

  • Size

    12KB

  • Sample

    240522-z8vrbahd58

  • MD5

    3afaa797525067cc5d7c074b42e1d2c4

  • SHA1

    a97b11a7caa41f08da29273b76dc9a1eed99de81

  • SHA256

    8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb

  • SHA512

    747127aaff415f0ddab4f960b55a69c78605521d147b92d584cedad960a2d6604ceb4a89459f973b232fa6208ea091dc8b9b817d002d5738d6871feb84bc5eb6

  • SSDEEP

    192:6L29RBzDzeobchBj8JONTON8DJrumgrEPEjr7Ahk:k29jnbcvYJOEmdumgvr7Ck

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb

    • Size

      12KB

    • MD5

      3afaa797525067cc5d7c074b42e1d2c4

    • SHA1

      a97b11a7caa41f08da29273b76dc9a1eed99de81

    • SHA256

      8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb

    • SHA512

      747127aaff415f0ddab4f960b55a69c78605521d147b92d584cedad960a2d6604ceb4a89459f973b232fa6208ea091dc8b9b817d002d5738d6871feb84bc5eb6

    • SSDEEP

      192:6L29RBzDzeobchBj8JONTON8DJrumgrEPEjr7Ahk:k29jnbcvYJOEmdumgvr7Ck

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks