General

  • Target

    98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967

  • Size

    12KB

  • Sample

    240522-zpcrdsgc2s

  • MD5

    eb9da3fc33a9f41789575d2f9d208261

  • SHA1

    edc6bff045fde03e8d69c280e59ec6adef706ab6

  • SHA256

    98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967

  • SHA512

    2ea4a5d9e95bb41a862f509798773d3dd3e3327d4b2e4d3cdf7c5cc12600806d2c70cf8cc28c2ca358025705eb7cdbca3621014394d3f8c5c4334ae2a92ca48b

  • SSDEEP

    192:zL29RBzDzeobchBj8JONfONGBjru+rEPEjr7AhI:v29jnbcvYJO0wBu+vr7CI

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967

    • Size

      12KB

    • MD5

      eb9da3fc33a9f41789575d2f9d208261

    • SHA1

      edc6bff045fde03e8d69c280e59ec6adef706ab6

    • SHA256

      98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967

    • SHA512

      2ea4a5d9e95bb41a862f509798773d3dd3e3327d4b2e4d3cdf7c5cc12600806d2c70cf8cc28c2ca358025705eb7cdbca3621014394d3f8c5c4334ae2a92ca48b

    • SSDEEP

      192:zL29RBzDzeobchBj8JONfONGBjru+rEPEjr7AhI:v29jnbcvYJO0wBu+vr7CI

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks