General
-
Target
982fae60f3f022be44297df3c57f2a3036d88bfa21d41d3ee3394656d75aef9c
-
Size
12KB
-
Sample
240522-2wk3fscb6z
-
MD5
6f17c416608eb0b24118b3b1ec8b0750
-
SHA1
b51b353b8dfcb54ffe3f756fe74b3c0911526bca
-
SHA256
982fae60f3f022be44297df3c57f2a3036d88bfa21d41d3ee3394656d75aef9c
-
SHA512
a8b810813d588efd59dac75c48994dd0084556814b77c4836a211c830dbf70674be911efcac15ba88fbbe037bed0fd4af34053e93120cbd57e24ce99ec32c9c6
-
SSDEEP
192:dL29RBzDzeobchBj8JONKONQrus0rEPEjr7Ahh:F29jnbcvYJOn2uNvr7Ch
Static task
static1
Behavioral task
behavioral1
Sample
982fae60f3f022be44297df3c57f2a3036d88bfa21d41d3ee3394656d75aef9c.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
982fae60f3f022be44297df3c57f2a3036d88bfa21d41d3ee3394656d75aef9c.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
982fae60f3f022be44297df3c57f2a3036d88bfa21d41d3ee3394656d75aef9c
-
Size
12KB
-
MD5
6f17c416608eb0b24118b3b1ec8b0750
-
SHA1
b51b353b8dfcb54ffe3f756fe74b3c0911526bca
-
SHA256
982fae60f3f022be44297df3c57f2a3036d88bfa21d41d3ee3394656d75aef9c
-
SHA512
a8b810813d588efd59dac75c48994dd0084556814b77c4836a211c830dbf70674be911efcac15ba88fbbe037bed0fd4af34053e93120cbd57e24ce99ec32c9c6
-
SSDEEP
192:dL29RBzDzeobchBj8JONKONQrus0rEPEjr7Ahh:F29jnbcvYJOn2uNvr7Ch
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-