General
-
Target
e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576
-
Size
12KB
-
Sample
240522-2b33jabb6s
-
MD5
358eda16dd3dfa8afa2449b0ec68d11c
-
SHA1
25d80cb6a52b056d1191ea85ece03310c65c3667
-
SHA256
e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576
-
SHA512
7e2e2f583705b8d998b5a1ddc354c2ca00287fc62f036ed05148447eba2a42f0111328a91c94c606e2407e34c4c07b30d136e962d3ff78b652071b0d0819654e
-
SSDEEP
192:4L29RBzDzeobchBj8JONLONIMruLrEPEjr7AhM:229jnbcvYJOMesuLvr7CM
Static task
static1
Behavioral task
behavioral1
Sample
e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576
-
Size
12KB
-
MD5
358eda16dd3dfa8afa2449b0ec68d11c
-
SHA1
25d80cb6a52b056d1191ea85ece03310c65c3667
-
SHA256
e2e3d49623cd7e379e9bc7df1eb26c28d81b4ae8d01e534ad5e62e06d0991576
-
SHA512
7e2e2f583705b8d998b5a1ddc354c2ca00287fc62f036ed05148447eba2a42f0111328a91c94c606e2407e34c4c07b30d136e962d3ff78b652071b0d0819654e
-
SSDEEP
192:4L29RBzDzeobchBj8JONLONIMruLrEPEjr7AhM:229jnbcvYJOMesuLvr7CM
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-