General

  • Target

    7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128

  • Size

    12KB

  • Sample

    240523-bkjr5sgc47

  • MD5

    856e43d0c930bbf9235d3bebaae2e8f3

  • SHA1

    93264d897109839945d6c0d0f71dfcb5cc0eeb6a

  • SHA256

    7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128

  • SHA512

    d1b40ade8a6d61fc9f57928aabbe9f1109104bc49fcfcbf288432a977825e183b05ed87f5d455a05df3bcf431c651470a28d344bf2ac24a4fc7da14a733d3037

  • SSDEEP

    192:IL29RBzDzeobchBj8JONoONA+wruGrEPEjr7AhL:G29jnbcvYJOFeuGvr7CL

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128

    • Size

      12KB

    • MD5

      856e43d0c930bbf9235d3bebaae2e8f3

    • SHA1

      93264d897109839945d6c0d0f71dfcb5cc0eeb6a

    • SHA256

      7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128

    • SHA512

      d1b40ade8a6d61fc9f57928aabbe9f1109104bc49fcfcbf288432a977825e183b05ed87f5d455a05df3bcf431c651470a28d344bf2ac24a4fc7da14a733d3037

    • SSDEEP

      192:IL29RBzDzeobchBj8JONoONA+wruGrEPEjr7AhL:G29jnbcvYJOFeuGvr7CL

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks