General
-
Target
dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618
-
Size
12KB
-
Sample
240522-2t3vgscb39
-
MD5
52703d411fd572b76c4c45428f615b8d
-
SHA1
ac99152916654579e16464a11d0e31b7e2c35e3c
-
SHA256
dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618
-
SHA512
06204c56ad2e3fc064619b03ce67bc7f7ebe0ca2c6ade5bca0d10e46ec97b9c25eca76974944d493ab9c8c0930b08565a3edf72655bee1dfb941b90ce0b14720
-
SSDEEP
192:3L29RBzDzeobchBj8JONRONu+ruurEPEjr7AhW:b29jnbcvYJOO86uuvr7CW
Static task
static1
Behavioral task
behavioral1
Sample
dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618
-
Size
12KB
-
MD5
52703d411fd572b76c4c45428f615b8d
-
SHA1
ac99152916654579e16464a11d0e31b7e2c35e3c
-
SHA256
dc9b9848f504cb404d09c8462201ad25db8dfb2d2789a2f7dc8449ee82599618
-
SHA512
06204c56ad2e3fc064619b03ce67bc7f7ebe0ca2c6ade5bca0d10e46ec97b9c25eca76974944d493ab9c8c0930b08565a3edf72655bee1dfb941b90ce0b14720
-
SSDEEP
192:3L29RBzDzeobchBj8JONRONu+ruurEPEjr7AhW:b29jnbcvYJOO86uuvr7CW
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-