General
-
Target
2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c
-
Size
12KB
-
Sample
240522-2rw9xsca44
-
MD5
468838044ce224f9e08296f4a6ce5ad0
-
SHA1
140ffc092c32ebda7ad2c9d2579e931cf935e8b5
-
SHA256
2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c
-
SHA512
d3641a753227692caaacdfb0c989b6eadc6649f9442c3e34f481372dfefc5e3235daa714480608f053e2ea3c59a9c45f1be51308385f0480b48b09dcff0c609e
-
SSDEEP
192:FL29RBzDzeobchBj8JONzONfrucrEPEjr7Ahk1:929jnbcvYJOgxucvr7CE
Static task
static1
Behavioral task
behavioral1
Sample
2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c
-
Size
12KB
-
MD5
468838044ce224f9e08296f4a6ce5ad0
-
SHA1
140ffc092c32ebda7ad2c9d2579e931cf935e8b5
-
SHA256
2a47e8d91bedfb91bd4fac0491b3a2316dd22ad685ba3cfdfd0542a4079bca8c
-
SHA512
d3641a753227692caaacdfb0c989b6eadc6649f9442c3e34f481372dfefc5e3235daa714480608f053e2ea3c59a9c45f1be51308385f0480b48b09dcff0c609e
-
SSDEEP
192:FL29RBzDzeobchBj8JONzONfrucrEPEjr7Ahk1:929jnbcvYJOgxucvr7CE
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-