General

  • Target

    7a603add37172f8486249d08894a563999393459ce1642a4ab9666975d7677cb

  • Size

    12KB

  • Sample

    240523-bnmcfagd58

  • MD5

    4a3de749fdc594a4d0e1f7ab89f1e5f8

  • SHA1

    ff9dd497489f677ffc95b607847fac5fda12a57d

  • SHA256

    7a603add37172f8486249d08894a563999393459ce1642a4ab9666975d7677cb

  • SHA512

    5fd978a019cf55a7a952c753a20f2e8c6f823461eadf8043ab046e211d1c165ae1ef95d81f243b54d332aead3373358aa7f4705b875fb71907d19eba0a01ad80

  • SSDEEP

    192:uL29RBzDzeobchBj8JONkONuiruBrEPEjr7Ahf:g29jnbcvYJORtuBvr7Cf

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      7a603add37172f8486249d08894a563999393459ce1642a4ab9666975d7677cb

    • Size

      12KB

    • MD5

      4a3de749fdc594a4d0e1f7ab89f1e5f8

    • SHA1

      ff9dd497489f677ffc95b607847fac5fda12a57d

    • SHA256

      7a603add37172f8486249d08894a563999393459ce1642a4ab9666975d7677cb

    • SHA512

      5fd978a019cf55a7a952c753a20f2e8c6f823461eadf8043ab046e211d1c165ae1ef95d81f243b54d332aead3373358aa7f4705b875fb71907d19eba0a01ad80

    • SSDEEP

      192:uL29RBzDzeobchBj8JONkONuiruBrEPEjr7Ahf:g29jnbcvYJORtuBvr7Cf

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks