General
-
Target
807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991
-
Size
12KB
-
Sample
240522-25ks2sce9v
-
MD5
a4ac95c5df2cd54fa0b8444a6cd0c720
-
SHA1
f6ed1e0490150675e4fcdf848ddba4de722a5ae3
-
SHA256
807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991
-
SHA512
abbf577d78cee72b07a7c9061a43bfa74209b3c92609de2710ee78920e810b776fd9235538e29e8ac053de149f41ed64653184e895ad589ec80f7f4cd2594b7b
-
SSDEEP
192:BL29RBzDzeobchBj8JONEONdru1rEPEjr7Ahv:R29jnbcvYJOpnu1vr7Cv
Static task
static1
Behavioral task
behavioral1
Sample
807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991
-
Size
12KB
-
MD5
a4ac95c5df2cd54fa0b8444a6cd0c720
-
SHA1
f6ed1e0490150675e4fcdf848ddba4de722a5ae3
-
SHA256
807990cb05d6f890196ef19fe6058fa35f2009f56357a87aa5096fcaba371991
-
SHA512
abbf577d78cee72b07a7c9061a43bfa74209b3c92609de2710ee78920e810b776fd9235538e29e8ac053de149f41ed64653184e895ad589ec80f7f4cd2594b7b
-
SSDEEP
192:BL29RBzDzeobchBj8JONEONdru1rEPEjr7Ahv:R29jnbcvYJOpnu1vr7Cv
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-