General
-
Target
db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3
-
Size
12KB
-
Sample
240522-245rtsce86
-
MD5
ca358ecda2007d5b14aa7b01e213abd1
-
SHA1
1914d185732fa3e13a6c3052cd5757a93d793e88
-
SHA256
db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3
-
SHA512
3a53f732c108410f5800cacfaeb445efc2f82f107c128eea02183f13ab8d2b9637de841b246857d1bb2efa9d264fc8867a8a457affb38bba2dab5f6b259d810c
-
SSDEEP
192:lL29RBzDzeobchBj8JON8ON8rulrEPEjr7Ahn:d29jnbcvYJONuulvr7Cn
Static task
static1
Behavioral task
behavioral1
Sample
db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3
-
Size
12KB
-
MD5
ca358ecda2007d5b14aa7b01e213abd1
-
SHA1
1914d185732fa3e13a6c3052cd5757a93d793e88
-
SHA256
db661318affafa7c1e19bbd8421f5473bbc9ce61e7b3371261638de2406740b3
-
SHA512
3a53f732c108410f5800cacfaeb445efc2f82f107c128eea02183f13ab8d2b9637de841b246857d1bb2efa9d264fc8867a8a457affb38bba2dab5f6b259d810c
-
SSDEEP
192:lL29RBzDzeobchBj8JON8ON8rulrEPEjr7Ahn:d29jnbcvYJONuulvr7Cn
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-