General
-
Target
49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88
-
Size
12KB
-
Sample
240522-1ezzlshg29
-
MD5
923a25dd6a9cccc96fa6887c2cb27bed
-
SHA1
7a3b91376c110de3e1f552c74d15e654efcbc6e5
-
SHA256
49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88
-
SHA512
af94bd9e6f73abdf7d2bca627d9a51f4ec313f3ba264bed171f6451a911a33f315ad0e382e90814435dbd2d67cfb968d0b8560363e786684509f03c521c8c851
-
SSDEEP
192:sL29RBzDzeobchBj8JONMON03ruprEPEjr7AhH:C29jnbcvYJOZgupvr7CH
Static task
static1
Behavioral task
behavioral1
Sample
49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88
-
Size
12KB
-
MD5
923a25dd6a9cccc96fa6887c2cb27bed
-
SHA1
7a3b91376c110de3e1f552c74d15e654efcbc6e5
-
SHA256
49e809ce8f3da6a91ef1735e82769468adab36d07095300a480fe625e68deb88
-
SHA512
af94bd9e6f73abdf7d2bca627d9a51f4ec313f3ba264bed171f6451a911a33f315ad0e382e90814435dbd2d67cfb968d0b8560363e786684509f03c521c8c851
-
SSDEEP
192:sL29RBzDzeobchBj8JONMON03ruprEPEjr7AhH:C29jnbcvYJOZgupvr7CH
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-