General

  • Target

    0c80a5b85e5c183be0e72555a6cbb01373aa6786f5cd9c6b1b33ed0b2c0626a6

  • Size

    12KB

  • Sample

    240523-bwqd3agf41

  • MD5

    9c29fa879f4bb516bf284091f214578f

  • SHA1

    7fb01e0e2f8f4fd269e68defccbaad8edfb7f53f

  • SHA256

    0c80a5b85e5c183be0e72555a6cbb01373aa6786f5cd9c6b1b33ed0b2c0626a6

  • SHA512

    d3a813ce0089dd307825e3c7de54766772cb3b7cb600b1feba880cf0bc11306fcc429a28836e00ffe641921a7ac4bfe87c5c7d6a6cc43d1a2c29e5b72557e88b

  • SSDEEP

    192:hL29RBzDzeobchBj8JONRONatruGrEPEjr7Ahe:x29jnbcvYJOuwuGvr7Ce

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      0c80a5b85e5c183be0e72555a6cbb01373aa6786f5cd9c6b1b33ed0b2c0626a6

    • Size

      12KB

    • MD5

      9c29fa879f4bb516bf284091f214578f

    • SHA1

      7fb01e0e2f8f4fd269e68defccbaad8edfb7f53f

    • SHA256

      0c80a5b85e5c183be0e72555a6cbb01373aa6786f5cd9c6b1b33ed0b2c0626a6

    • SHA512

      d3a813ce0089dd307825e3c7de54766772cb3b7cb600b1feba880cf0bc11306fcc429a28836e00ffe641921a7ac4bfe87c5c7d6a6cc43d1a2c29e5b72557e88b

    • SSDEEP

      192:hL29RBzDzeobchBj8JONRONatruGrEPEjr7Ahe:x29jnbcvYJOuwuGvr7Ce

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks