General

  • Target

    2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0

  • Size

    12KB

  • Sample

    240522-z96j7she27

  • MD5

    570ab831bb4d931d62403749f4806f53

  • SHA1

    8be0f8980ce16c2111129779445b700310dc6ab1

  • SHA256

    2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0

  • SHA512

    0150850714af5cc1b3ecc94fe037ba7cbd97bc367ac1d0c0d7ae1dbf6574e0a98ca8d42ce4f3799420fde823c7ccd1bb2b80b4f9c53ab129976962dd7f32e541

  • SSDEEP

    192:UL29RBzDzeobchBj8JONwONiZurusrEPEjr7Ahr:a29jnbcvYJON9usvr7Cr

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0

    • Size

      12KB

    • MD5

      570ab831bb4d931d62403749f4806f53

    • SHA1

      8be0f8980ce16c2111129779445b700310dc6ab1

    • SHA256

      2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0

    • SHA512

      0150850714af5cc1b3ecc94fe037ba7cbd97bc367ac1d0c0d7ae1dbf6574e0a98ca8d42ce4f3799420fde823c7ccd1bb2b80b4f9c53ab129976962dd7f32e541

    • SSDEEP

      192:UL29RBzDzeobchBj8JONwONiZurusrEPEjr7Ahr:a29jnbcvYJON9usvr7Cr

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks