General

  • Target

    eba467ce577920e843a0197e91e2e18c31e645d7c0c9f83575c0a2ff402b3572

  • Size

    12KB

  • Sample

    240523-bh5ltsfh7s

  • MD5

    5eed411f0b498b1309dd6969183aac8f

  • SHA1

    d43cb0ee3dc08251970d4426d2d7d1f2270c24b2

  • SHA256

    eba467ce577920e843a0197e91e2e18c31e645d7c0c9f83575c0a2ff402b3572

  • SHA512

    ca882e9a2e1b11154b8b264fa08232d911a56c1936ed89ce00af27e069bb9e56b3460288c0de2275deeebc22c3bf2cbe11375cc69ee6a8827ec05f079ce98a02

  • SSDEEP

    192:1L29RBzDzeobchBj8JON2ONhlPru2rEPEjr7AhV:t29jnbcvYJOLvlju2vr7CV

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      eba467ce577920e843a0197e91e2e18c31e645d7c0c9f83575c0a2ff402b3572

    • Size

      12KB

    • MD5

      5eed411f0b498b1309dd6969183aac8f

    • SHA1

      d43cb0ee3dc08251970d4426d2d7d1f2270c24b2

    • SHA256

      eba467ce577920e843a0197e91e2e18c31e645d7c0c9f83575c0a2ff402b3572

    • SHA512

      ca882e9a2e1b11154b8b264fa08232d911a56c1936ed89ce00af27e069bb9e56b3460288c0de2275deeebc22c3bf2cbe11375cc69ee6a8827ec05f079ce98a02

    • SSDEEP

      192:1L29RBzDzeobchBj8JON2ONhlPru2rEPEjr7AhV:t29jnbcvYJOLvlju2vr7CV

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks