General
-
Target
b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406
-
Size
12KB
-
Sample
240522-3j77wsdc71
-
MD5
0ee68e4ffc2bd5cd6036920ee818d792
-
SHA1
deb3b3f307d7e7d9b00e299079c7f07549aa7fc9
-
SHA256
b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406
-
SHA512
913d5877b011e72d098f79147b3df137afaf8b0a77e903b64b77cfc161f573bdda16f1a31260a8aca22db53bd31c46c4ce9f92abe596892789c262ec6a49bcc3
-
SSDEEP
192:aL29RBzDzeobchBj8JONy1ONl2Aru3rEPEjr7AhV:E29jnbcvYJOkET24u3vr7CV
Static task
static1
Behavioral task
behavioral1
Sample
b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406.xll
Resource
win11-20240419-en
Malware Config
Extracted
Targets
-
-
Target
b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406
-
Size
12KB
-
MD5
0ee68e4ffc2bd5cd6036920ee818d792
-
SHA1
deb3b3f307d7e7d9b00e299079c7f07549aa7fc9
-
SHA256
b241dc48365430b15d7f7818c07870d906acf4f36aadcd696f4b248a693e6406
-
SHA512
913d5877b011e72d098f79147b3df137afaf8b0a77e903b64b77cfc161f573bdda16f1a31260a8aca22db53bd31c46c4ce9f92abe596892789c262ec6a49bcc3
-
SSDEEP
192:aL29RBzDzeobchBj8JONy1ONl2Aru3rEPEjr7AhV:E29jnbcvYJOkET24u3vr7CV
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-