General

  • Target

    fe5c0da962674cc3767f94f416348b62ec47d01cccd55a8083f88b58ffec8465

  • Size

    12KB

  • Sample

    240522-z9qtrahd88

  • MD5

    ff008f9481f3a5f8ae8a67e025d0cf3f

  • SHA1

    66d1596463ef54410d5ca53d19c84efd71427d84

  • SHA256

    fe5c0da962674cc3767f94f416348b62ec47d01cccd55a8083f88b58ffec8465

  • SHA512

    74765a651547482466c7161a23e17ee1c2cb7e9708b8023e6218e57d9938c61caf1fc06875c4481dda40024e84ee996fa92c3a161cc725b9bae2c4fb85ac25f2

  • SSDEEP

    192:VL29RBzDzeobchBj8JONxONiAeruFrEPEjr7Ah2:N29jnbcvYJOusAauFvr7C2

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      fe5c0da962674cc3767f94f416348b62ec47d01cccd55a8083f88b58ffec8465

    • Size

      12KB

    • MD5

      ff008f9481f3a5f8ae8a67e025d0cf3f

    • SHA1

      66d1596463ef54410d5ca53d19c84efd71427d84

    • SHA256

      fe5c0da962674cc3767f94f416348b62ec47d01cccd55a8083f88b58ffec8465

    • SHA512

      74765a651547482466c7161a23e17ee1c2cb7e9708b8023e6218e57d9938c61caf1fc06875c4481dda40024e84ee996fa92c3a161cc725b9bae2c4fb85ac25f2

    • SSDEEP

      192:VL29RBzDzeobchBj8JONxONiAeruFrEPEjr7Ah2:N29jnbcvYJOusAauFvr7C2

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks