General

  • Target

    8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e

  • Size

    12KB

  • Sample

    240523-a652tsfe77

  • MD5

    5782bce05a477af3d8504a4ea8854f54

  • SHA1

    2d795f303173b858063166709fd5852c7cf3499b

  • SHA256

    8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e

  • SHA512

    3715862c3e61d1502b5b0a524e1a15c7c0acc15c0db392c5b312bd6f7a8951197c2c3c3ae0bc082fffdb5080a4184a8732742e1bdab63140ccf9cc00e2008eb9

  • SSDEEP

    192:ZL29RBzDzeobchBj8JONiONgruCrEPEjr7Ahx:529jnbcvYJODiuCvr7Cx

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e

    • Size

      12KB

    • MD5

      5782bce05a477af3d8504a4ea8854f54

    • SHA1

      2d795f303173b858063166709fd5852c7cf3499b

    • SHA256

      8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e

    • SHA512

      3715862c3e61d1502b5b0a524e1a15c7c0acc15c0db392c5b312bd6f7a8951197c2c3c3ae0bc082fffdb5080a4184a8732742e1bdab63140ccf9cc00e2008eb9

    • SSDEEP

      192:ZL29RBzDzeobchBj8JONiONgruCrEPEjr7Ahx:529jnbcvYJODiuCvr7Cx

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks