General

  • Target

    45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7

  • Size

    12KB

  • Sample

    240523-ag29msed75

  • MD5

    6c93094ce7e68105d2649782011ae102

  • SHA1

    cdcd50d7485aadd52968427808ff46dae934f8d0

  • SHA256

    45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7

  • SHA512

    237efad5fb9d8f003c74832df37d21e3c6a08385905d0e37d6313f6725a56cdac6bfd2405251e1205a7cdc299a1bd3f1a6228bc00ebaaa18582c40eb837721cb

  • SSDEEP

    192:WL29RBzDzeobchBj8JONjONnru8rEPEjr7Ahc:429jnbcvYJOk9u8vr7Cc

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7

    • Size

      12KB

    • MD5

      6c93094ce7e68105d2649782011ae102

    • SHA1

      cdcd50d7485aadd52968427808ff46dae934f8d0

    • SHA256

      45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7

    • SHA512

      237efad5fb9d8f003c74832df37d21e3c6a08385905d0e37d6313f6725a56cdac6bfd2405251e1205a7cdc299a1bd3f1a6228bc00ebaaa18582c40eb837721cb

    • SSDEEP

      192:WL29RBzDzeobchBj8JONjONnru8rEPEjr7Ahc:429jnbcvYJOk9u8vr7Cc

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks