General
-
Target
c9622daa3ff49aade5d7933e66c68a4c5c2eec98f0fecb4da6d4a9f97ee8aab2
-
Size
12KB
-
Sample
240522-2n4jtsbh39
-
MD5
8cce136ed4523411a16f580f04863a84
-
SHA1
bf43b43a5711285d2235db011e872e91c6ad097e
-
SHA256
c9622daa3ff49aade5d7933e66c68a4c5c2eec98f0fecb4da6d4a9f97ee8aab2
-
SHA512
413a8977041b1b12241d1bacfdc9a5cd8c6b3d2eed1b6a22cdccd101972e49f64a774c32be98af437ee3fe7a21c66683cb3b50fd15d6f6c3a939edce11fa4d8d
-
SSDEEP
192:xL29RBzDzeobchBj8JON7ON1ruRrEPEjr7AhE:B29jnbcvYJOMTuRvr7CE
Static task
static1
Behavioral task
behavioral1
Sample
c9622daa3ff49aade5d7933e66c68a4c5c2eec98f0fecb4da6d4a9f97ee8aab2.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
c9622daa3ff49aade5d7933e66c68a4c5c2eec98f0fecb4da6d4a9f97ee8aab2.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
c9622daa3ff49aade5d7933e66c68a4c5c2eec98f0fecb4da6d4a9f97ee8aab2
-
Size
12KB
-
MD5
8cce136ed4523411a16f580f04863a84
-
SHA1
bf43b43a5711285d2235db011e872e91c6ad097e
-
SHA256
c9622daa3ff49aade5d7933e66c68a4c5c2eec98f0fecb4da6d4a9f97ee8aab2
-
SHA512
413a8977041b1b12241d1bacfdc9a5cd8c6b3d2eed1b6a22cdccd101972e49f64a774c32be98af437ee3fe7a21c66683cb3b50fd15d6f6c3a939edce11fa4d8d
-
SSDEEP
192:xL29RBzDzeobchBj8JON7ON1ruRrEPEjr7AhE:B29jnbcvYJOMTuRvr7CE
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-