General

  • Target

    a264b4b538f76d081fbbb59c8f9b916e156d959b0f9378576b67ea9c2fbc8f09

  • Size

    12KB

  • Sample

    240523-bw6faagf6w

  • MD5

    d9ce8b9648ff6af70d92099f2bd1aca9

  • SHA1

    a00cf0d51d34d004c1c8e3231dc4ef6cb0f3c7cf

  • SHA256

    a264b4b538f76d081fbbb59c8f9b916e156d959b0f9378576b67ea9c2fbc8f09

  • SHA512

    129d089f82e7180b07d2ec4731042ce496b685270dfeeeb0a5ad1a927f945702d02a568973e80f55f0c655934360044e7bb7e7626313d81ea62624046672d0fd

  • SSDEEP

    192:cL29RBzDzeobchBj8JONhVONH25axrulrEPEjr7AhI:y29jnbcvYJODk0YBulvr7CI

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      a264b4b538f76d081fbbb59c8f9b916e156d959b0f9378576b67ea9c2fbc8f09

    • Size

      12KB

    • MD5

      d9ce8b9648ff6af70d92099f2bd1aca9

    • SHA1

      a00cf0d51d34d004c1c8e3231dc4ef6cb0f3c7cf

    • SHA256

      a264b4b538f76d081fbbb59c8f9b916e156d959b0f9378576b67ea9c2fbc8f09

    • SHA512

      129d089f82e7180b07d2ec4731042ce496b685270dfeeeb0a5ad1a927f945702d02a568973e80f55f0c655934360044e7bb7e7626313d81ea62624046672d0fd

    • SSDEEP

      192:cL29RBzDzeobchBj8JONhVONH25axrulrEPEjr7AhI:y29jnbcvYJODk0YBulvr7CI

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks