General

  • Target

    1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec

  • Size

    12KB

  • Sample

    240522-zj7dtafh8x

  • MD5

    41adaf16b1b0ebe0107199b31de9808c

  • SHA1

    cd30baea039de08479d00a62f8ad04d9516eb5b3

  • SHA256

    1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec

  • SHA512

    2b19ac1bcb5809696b17316d1d79ae79531a558b1ab7311b32deb7f63cb7113d865f5bbdc14a9ba42dd36fa91f3952dc21ba7e65dbded3c85b7a7eeeb3e76949

  • SSDEEP

    192:wL29RBzDzeobchBj8JON4ONjwruxrEPEjr7Ah7:e29jnbcvYJOlJouxvr7C7

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec

    • Size

      12KB

    • MD5

      41adaf16b1b0ebe0107199b31de9808c

    • SHA1

      cd30baea039de08479d00a62f8ad04d9516eb5b3

    • SHA256

      1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec

    • SHA512

      2b19ac1bcb5809696b17316d1d79ae79531a558b1ab7311b32deb7f63cb7113d865f5bbdc14a9ba42dd36fa91f3952dc21ba7e65dbded3c85b7a7eeeb3e76949

    • SSDEEP

      192:wL29RBzDzeobchBj8JON4ONjwruxrEPEjr7Ah7:e29jnbcvYJOlJouxvr7C7

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks