General

  • Target

    a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4

  • Size

    12KB

  • Sample

    240523-bqbcysge39

  • MD5

    ee6c79fd4247c2c265c16985c7459af4

  • SHA1

    7899162e9bccb0e16739814da2ad2ebca46a58b9

  • SHA256

    a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4

  • SHA512

    7d31f5e89e4a3bf9f51f7211f78d0ce07463a68bfc99276be4b99c17ed794726648c2012786fed9900ebc59bad042de8b31fe96645cf143cdaebef6ae84e9fb5

  • SSDEEP

    192:pL29RBzDzeobchBj8JONLON3qbruIrEPEjr7Ah83:J29jnbcvYJOEdq3uIvr7C0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4

    • Size

      12KB

    • MD5

      ee6c79fd4247c2c265c16985c7459af4

    • SHA1

      7899162e9bccb0e16739814da2ad2ebca46a58b9

    • SHA256

      a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4

    • SHA512

      7d31f5e89e4a3bf9f51f7211f78d0ce07463a68bfc99276be4b99c17ed794726648c2012786fed9900ebc59bad042de8b31fe96645cf143cdaebef6ae84e9fb5

    • SSDEEP

      192:pL29RBzDzeobchBj8JONLON3qbruIrEPEjr7Ah83:J29jnbcvYJOEdq3uIvr7C0

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks