General
-
Target
3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435
-
Size
12KB
-
Sample
240522-2pjaaabg9w
-
MD5
e8fe86b382506efd1be93ca5f352ca64
-
SHA1
bbb1763a68611e5c2de32c877aba160c141139ab
-
SHA256
3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435
-
SHA512
5a8803adc697b77d1f6d1d890fd7379d608fa12e0ec24ba635c2502ad195deed97cc8975999931d00f5719168316921562e1e3549dcbaf771ebfb14c7f124df8
-
SSDEEP
192:cL29RBzDzeobchBj8JON9ONwruwrEPEjr7Ah6:y29jnbcvYJOuiuwvr7C6
Static task
static1
Behavioral task
behavioral1
Sample
3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435.xll
Resource
win11-20240419-en
Malware Config
Extracted
Targets
-
-
Target
3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435
-
Size
12KB
-
MD5
e8fe86b382506efd1be93ca5f352ca64
-
SHA1
bbb1763a68611e5c2de32c877aba160c141139ab
-
SHA256
3ed53c194dca23a1a64294212054ad1ea93892a576c7bab11c5b0ef54cbe0435
-
SHA512
5a8803adc697b77d1f6d1d890fd7379d608fa12e0ec24ba635c2502ad195deed97cc8975999931d00f5719168316921562e1e3549dcbaf771ebfb14c7f124df8
-
SSDEEP
192:cL29RBzDzeobchBj8JON9ONwruwrEPEjr7Ah6:y29jnbcvYJOuiuwvr7C6
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-