General

  • Target

    87210259d05c234a592d57823289eae8708a623366fe5ccac5898c9c6eec66c0

  • Size

    12KB

  • Sample

    240522-ze1qgaff81

  • MD5

    e96dea05458152839033273b73fbde3c

  • SHA1

    39e9fbe3ec6019fe1c5d750ded2caf77675c2184

  • SHA256

    87210259d05c234a592d57823289eae8708a623366fe5ccac5898c9c6eec66c0

  • SHA512

    de873c970d23e5168d172d9da0aa2284dfd276e4e868607a8ae5c3b81ee137a895feb767f2815c6cb1e8e31fd1469eb87cf29f804957ccdee5f6b1c5607dc08b

  • SSDEEP

    192:gL29RBzDzeobchBj8JON8ONwCFru2rEPEjr7AhP:O29jnbcvYJOp5u2vr7CP

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      87210259d05c234a592d57823289eae8708a623366fe5ccac5898c9c6eec66c0

    • Size

      12KB

    • MD5

      e96dea05458152839033273b73fbde3c

    • SHA1

      39e9fbe3ec6019fe1c5d750ded2caf77675c2184

    • SHA256

      87210259d05c234a592d57823289eae8708a623366fe5ccac5898c9c6eec66c0

    • SHA512

      de873c970d23e5168d172d9da0aa2284dfd276e4e868607a8ae5c3b81ee137a895feb767f2815c6cb1e8e31fd1469eb87cf29f804957ccdee5f6b1c5607dc08b

    • SSDEEP

      192:gL29RBzDzeobchBj8JON8ONwCFru2rEPEjr7AhP:O29jnbcvYJOp5u2vr7CP

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks