General
-
Target
69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292
-
Size
12KB
-
Sample
240522-2njjnabg6z
-
MD5
4ee91d6d1bf14e64918c05d3ceaafaf2
-
SHA1
4a8072f77f28d684fb3ebe49b4be8c8fba6ae713
-
SHA256
69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292
-
SHA512
bd080d7844b5760f022d347206f5974280f720150a92436bf5afcd082cf346902c8076e86e76ece7da309c6b8896d4f83033dc2781ae2fe7f5979eb091139143
-
SSDEEP
192:KL29RBzDzeobchBj8JONBrON6m6+oruCrEPEjr7Ahy:029jnbcvYJO2nbwuCvr7Cy
Static task
static1
Behavioral task
behavioral1
Sample
69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292
-
Size
12KB
-
MD5
4ee91d6d1bf14e64918c05d3ceaafaf2
-
SHA1
4a8072f77f28d684fb3ebe49b4be8c8fba6ae713
-
SHA256
69609a4f5c21218b7b53376aa4c9ff33d23f9a078cc728ce291402cc91e60292
-
SHA512
bd080d7844b5760f022d347206f5974280f720150a92436bf5afcd082cf346902c8076e86e76ece7da309c6b8896d4f83033dc2781ae2fe7f5979eb091139143
-
SSDEEP
192:KL29RBzDzeobchBj8JONBrON6m6+oruCrEPEjr7Ahy:029jnbcvYJO2nbwuCvr7Cy
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Loads dropped DLL
-