General

  • Target

    b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65

  • Size

    12KB

  • Sample

    240522-znx1yagc64

  • MD5

    4fcee939685d4352cb44b402f3f7fd1d

  • SHA1

    b67a08d599e7a2cdf914556e5d69a8fcbdcb6222

  • SHA256

    b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65

  • SHA512

    ee82da0dfe96b885cf65a4e4b9431316e85cb7707c28dbba1e5ff4f24bc2c019849788b2fe68ac31da6246db2c8e8b8b0b02be300433ab034059e103e5505050

  • SSDEEP

    192:ixL29RBzDzeobchBj8JONJONdruqrEPEjr7Ah+:g29jnbcvYJOqPuqvr7C+

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65

    • Size

      12KB

    • MD5

      4fcee939685d4352cb44b402f3f7fd1d

    • SHA1

      b67a08d599e7a2cdf914556e5d69a8fcbdcb6222

    • SHA256

      b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65

    • SHA512

      ee82da0dfe96b885cf65a4e4b9431316e85cb7707c28dbba1e5ff4f24bc2c019849788b2fe68ac31da6246db2c8e8b8b0b02be300433ab034059e103e5505050

    • SSDEEP

      192:ixL29RBzDzeobchBj8JONJONdruqrEPEjr7Ah+:g29jnbcvYJOqPuqvr7C+

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks