General
-
Target
4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9
-
Size
12KB
-
Sample
240522-2a8lmabc46
-
MD5
98aaca320e0f19a57d606415e5b2dd83
-
SHA1
1a1211bc9bf9a7df0844f160f25e04bb0f55c1c6
-
SHA256
4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9
-
SHA512
f48a48f3d893fceb3282d29c7d1324513f7c21795009f5903981d0fcf1b1471e520dd802c483e19c45d49a1269593b83f4b230fae96c255b2cd14b37f2eb5ab1
-
SSDEEP
192:TL29RBzDzeobchBj8JONSONuMpruQrEPEjr7Ahp:P29jnbcvYJOvhuQvr7Cp
Static task
static1
Behavioral task
behavioral1
Sample
4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9
-
Size
12KB
-
MD5
98aaca320e0f19a57d606415e5b2dd83
-
SHA1
1a1211bc9bf9a7df0844f160f25e04bb0f55c1c6
-
SHA256
4463493da25ef32b3068f58973b166a4a85bbad4f54fc43dcaa34ffc68bd24a9
-
SHA512
f48a48f3d893fceb3282d29c7d1324513f7c21795009f5903981d0fcf1b1471e520dd802c483e19c45d49a1269593b83f4b230fae96c255b2cd14b37f2eb5ab1
-
SSDEEP
192:TL29RBzDzeobchBj8JONSONuMpruQrEPEjr7Ahp:P29jnbcvYJOvhuQvr7Cp
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-