General

  • Target

    393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056

  • Size

    12KB

  • Sample

    240523-jvj5naab7z

  • MD5

    460bd6d522b0a9a99015e763bff25ab6

  • SHA1

    cdaab1bf2071c7e71b2bd3c2a9ca83f94669eb3e

  • SHA256

    393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056

  • SHA512

    2d9f2b628fcb629b37ffa7fb848f1dfec3baac2a9ed66c4334ac7b9a9a7faf1d8ea813e62ad512340843bb5a815f10879e74522dc8451134c93d9b95b52294bb

  • SSDEEP

    192:L9L29RBzDzeobchBj8JONrONdHruYrEPEjr7Ahs:Ll29jnbcvYJOILLuYvr7Cs

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Targets

    • Target

      393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056

    • Size

      12KB

    • MD5

      460bd6d522b0a9a99015e763bff25ab6

    • SHA1

      cdaab1bf2071c7e71b2bd3c2a9ca83f94669eb3e

    • SHA256

      393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056

    • SHA512

      2d9f2b628fcb629b37ffa7fb848f1dfec3baac2a9ed66c4334ac7b9a9a7faf1d8ea813e62ad512340843bb5a815f10879e74522dc8451134c93d9b95b52294bb

    • SSDEEP

      192:L9L29RBzDzeobchBj8JONrONdHruYrEPEjr7Ahs:Ll29jnbcvYJOILLuYvr7Cs

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Tasks