General

  • Target

    c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50

  • Size

    12KB

  • Sample

    240523-bkehesga3z

  • MD5

    473c43bf1623b8e7ba5d8098b34043cf

  • SHA1

    fc6b68315f59cdd381b1e699392e3fc4648f267b

  • SHA256

    c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50

  • SHA512

    30c06cc555bf97045755cd7e0ef94a971483bcb9ad2dc5460aa88462ad23442c165c32462bd4c1a52ce9f7a46375ab460151cc66792e5bf6cb3a389c9cac59ca

  • SSDEEP

    192:vL29RBzDzeobchBj8JONKONozbru1rEPEjr7Ah5:D29jnbcvYJO/su1vr7C5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50

    • Size

      12KB

    • MD5

      473c43bf1623b8e7ba5d8098b34043cf

    • SHA1

      fc6b68315f59cdd381b1e699392e3fc4648f267b

    • SHA256

      c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50

    • SHA512

      30c06cc555bf97045755cd7e0ef94a971483bcb9ad2dc5460aa88462ad23442c165c32462bd4c1a52ce9f7a46375ab460151cc66792e5bf6cb3a389c9cac59ca

    • SSDEEP

      192:vL29RBzDzeobchBj8JONKONozbru1rEPEjr7Ah5:D29jnbcvYJO/su1vr7C5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks