General

  • Target

    8f0e6a138d43f9a6782bb76c3497c7dcc7ebdca0f368e09951479f844b820043

  • Size

    12KB

  • Sample

    240523-aksvdaee74

  • MD5

    282278f384d937d88bd27fbe9adaabea

  • SHA1

    37ba83a7bbd55428a93909209aa5a3cf908b8146

  • SHA256

    8f0e6a138d43f9a6782bb76c3497c7dcc7ebdca0f368e09951479f844b820043

  • SHA512

    c77f8dde0a0cc34c23a86181ebd126897015ff908e2e80ff01f6e8e4d88622d9048faa6d27417cdd38757f444b29f0f7219b39f7eb9ac8ec615f509b38d93bdd

  • SSDEEP

    192:iL29RBzDzeobchBj8JON8ONEOf+rulrEPEjr7Ah/:829jnbcvYJOJp6ulvr7C/

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      8f0e6a138d43f9a6782bb76c3497c7dcc7ebdca0f368e09951479f844b820043

    • Size

      12KB

    • MD5

      282278f384d937d88bd27fbe9adaabea

    • SHA1

      37ba83a7bbd55428a93909209aa5a3cf908b8146

    • SHA256

      8f0e6a138d43f9a6782bb76c3497c7dcc7ebdca0f368e09951479f844b820043

    • SHA512

      c77f8dde0a0cc34c23a86181ebd126897015ff908e2e80ff01f6e8e4d88622d9048faa6d27417cdd38757f444b29f0f7219b39f7eb9ac8ec615f509b38d93bdd

    • SSDEEP

      192:iL29RBzDzeobchBj8JON8ONEOf+rulrEPEjr7Ah/:829jnbcvYJOJp6ulvr7C/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks