General

  • Target

    063dabec85fc205b1d7bf3b7be4fda7f6704ffc4be098af14a6aae97e3ac7374

  • Size

    12KB

  • Sample

    240522-zhebmsfg9y

  • MD5

    913688e51ceef1987f55a905976422b8

  • SHA1

    ac35e70d94ab8aca44700b1ca071b7bf89884059

  • SHA256

    063dabec85fc205b1d7bf3b7be4fda7f6704ffc4be098af14a6aae97e3ac7374

  • SHA512

    28f8200e8b43461af824be41ba98ebba052d29a457fbbf70483383844e7ed81b06299ae443ce3f2958863663e26bf6f7e0ff63f43f1e5dc2d180865b1560ab03

  • SSDEEP

    192:nL29RBzDzeobchBj8JONEON5ruOrEPEjr7Ahn:L29jnbcvYJOVnuOvr7Cn

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      063dabec85fc205b1d7bf3b7be4fda7f6704ffc4be098af14a6aae97e3ac7374

    • Size

      12KB

    • MD5

      913688e51ceef1987f55a905976422b8

    • SHA1

      ac35e70d94ab8aca44700b1ca071b7bf89884059

    • SHA256

      063dabec85fc205b1d7bf3b7be4fda7f6704ffc4be098af14a6aae97e3ac7374

    • SHA512

      28f8200e8b43461af824be41ba98ebba052d29a457fbbf70483383844e7ed81b06299ae443ce3f2958863663e26bf6f7e0ff63f43f1e5dc2d180865b1560ab03

    • SSDEEP

      192:nL29RBzDzeobchBj8JONEON5ruOrEPEjr7Ahn:L29jnbcvYJOVnuOvr7Cn

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks