General

  • Target

    6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f

  • Size

    12KB

  • Sample

    240523-a1anqsfc43

  • MD5

    cb04460ddd619b8c8ee5640700e68505

  • SHA1

    9f82dce8ca6a1bb168792cce87ded691a3af123c

  • SHA256

    6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f

  • SHA512

    db46926d9e94f9803a94cc3d278265667a3db93df00ab900c28d94c6ebae0575025a132cc212880120c5aec100fbd9d295087c8f1b6b27b0e74adb894f1e9122

  • SSDEEP

    192:JL29RBzDzeobchBj8JONdmONlLhruTrEPEjr7Ahf:p29jnbcvYJOFBuTvr7Cf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f

    • Size

      12KB

    • MD5

      cb04460ddd619b8c8ee5640700e68505

    • SHA1

      9f82dce8ca6a1bb168792cce87ded691a3af123c

    • SHA256

      6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f

    • SHA512

      db46926d9e94f9803a94cc3d278265667a3db93df00ab900c28d94c6ebae0575025a132cc212880120c5aec100fbd9d295087c8f1b6b27b0e74adb894f1e9122

    • SSDEEP

      192:JL29RBzDzeobchBj8JONdmONlLhruTrEPEjr7Ahf:p29jnbcvYJOFBuTvr7Cf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks