General

  • Target

    e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee

  • Size

    12KB

  • Sample

    240523-ab3yzsea7x

  • MD5

    7fe6a98a952d9f7ef315940c6c95264a

  • SHA1

    bb45b80134d00faefb6c6f4d4d582d9b1a17ce59

  • SHA256

    e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee

  • SHA512

    4343dbbc6e019cb21445b6a10f806c551945f51a9a1e89c296c9536d74f0a7b07dc459072aad74393167790807562d6adb505ec16031bc921337431da2dfcd47

  • SSDEEP

    192:rL29RBzDzeobchBj8JONpONDrunrEPEjr7Ahu:X29jnbcvYJOyBunvr7Cu

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee

    • Size

      12KB

    • MD5

      7fe6a98a952d9f7ef315940c6c95264a

    • SHA1

      bb45b80134d00faefb6c6f4d4d582d9b1a17ce59

    • SHA256

      e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee

    • SHA512

      4343dbbc6e019cb21445b6a10f806c551945f51a9a1e89c296c9536d74f0a7b07dc459072aad74393167790807562d6adb505ec16031bc921337431da2dfcd47

    • SSDEEP

      192:rL29RBzDzeobchBj8JONpONDrunrEPEjr7Ahu:X29jnbcvYJOyBunvr7Cu

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks