General
-
Target
71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c
-
Size
12KB
-
Sample
240522-2c6j2sbd37
-
MD5
0b19f67b42540a587979c750c9a1524c
-
SHA1
8aa1924734ee7bddc3ef4febf4d442ea579b5b68
-
SHA256
71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c
-
SHA512
e4f0e4d9be1407c8cb05a1b3d212ce118ec714ef80c0d077647ac1d5d9c228f3f2a77ec41c0a0377a1ee77f4c54534e7f832777ce25972e400f4416c27162d22
-
SSDEEP
192:JL29RBzDzeobchBj8JONoONtPruYrEPEjr7AhL:p29jnbcvYJOl7uYvr7CL
Static task
static1
Behavioral task
behavioral1
Sample
71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c
-
Size
12KB
-
MD5
0b19f67b42540a587979c750c9a1524c
-
SHA1
8aa1924734ee7bddc3ef4febf4d442ea579b5b68
-
SHA256
71b286e1f36d7a9e296f549b49dcff95a84a0ec002f6663aeeae51f34003894c
-
SHA512
e4f0e4d9be1407c8cb05a1b3d212ce118ec714ef80c0d077647ac1d5d9c228f3f2a77ec41c0a0377a1ee77f4c54534e7f832777ce25972e400f4416c27162d22
-
SSDEEP
192:JL29RBzDzeobchBj8JONoONtPruYrEPEjr7AhL:p29jnbcvYJOl7uYvr7CL
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-