General

  • Target

    Luxury Macro Exploit.exe

  • Size

    4.4MB

  • Sample

    240526-awyj1agb9v

  • MD5

    22bb8853289bed446fc3d4bfc52cfc45

  • SHA1

    f021536fbc904c9a2a1cae09902c1c2660a4c8c5

  • SHA256

    7a0bd91b7d9613662c5019252c87d7e565e4660a26df6e6914039b0eb27c8086

  • SHA512

    aea422c54e0e73c2a6203a2b62fa4a5d6a4d7da31371ca42ddf41d2e3db844171d7ce21db63fa85705f83a913600dbbb172d65ed105066e776b7ee10a3c3cdcc

  • SSDEEP

    98304:CVjdab58u1eCwZsX72zzTvtqrYujRv5i0MVs+fRrBKyXq/iGyEZcn8RF2nB8SH:CH88u1twZsLKt4RiHnK

Score
8/10

Malware Config

Targets

    • Target

      Luxury Macro Exploit.exe

    • Size

      4.4MB

    • MD5

      22bb8853289bed446fc3d4bfc52cfc45

    • SHA1

      f021536fbc904c9a2a1cae09902c1c2660a4c8c5

    • SHA256

      7a0bd91b7d9613662c5019252c87d7e565e4660a26df6e6914039b0eb27c8086

    • SHA512

      aea422c54e0e73c2a6203a2b62fa4a5d6a4d7da31371ca42ddf41d2e3db844171d7ce21db63fa85705f83a913600dbbb172d65ed105066e776b7ee10a3c3cdcc

    • SSDEEP

      98304:CVjdab58u1eCwZsX72zzTvtqrYujRv5i0MVs+fRrBKyXq/iGyEZcn8RF2nB8SH:CH88u1twZsLKt4RiHnK

    Score
    8/10
    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

MITRE ATT&CK Enterprise v15

Tasks