General
-
Target
851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19
-
Size
12KB
-
Sample
240522-3qtm3sde8x
-
MD5
45d76dbc83e4ba7f8e860acbb81a5099
-
SHA1
d33ac9b486fb0f80c27670f6c05c4e00785d5eae
-
SHA256
851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19
-
SHA512
497277580506aabc7b34f1024aa376a2c68d02b1fc8a1c7404562802d1ae41d6aa4eedd8ef1194457eb44cfb3869ff37eaaf2bc9ed1efa07212315bf91b2eae6
-
SSDEEP
192:QL29RBzDzeobchBj8JONqONkEruorEPEjr7Ahh:+29jnbcvYJOHXuovr7Ch
Static task
static1
Behavioral task
behavioral1
Sample
851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19
-
Size
12KB
-
MD5
45d76dbc83e4ba7f8e860acbb81a5099
-
SHA1
d33ac9b486fb0f80c27670f6c05c4e00785d5eae
-
SHA256
851bd5338d5dbfab62eb0ca0de29bbbc777d90848a302dfc49f84056d81f4e19
-
SHA512
497277580506aabc7b34f1024aa376a2c68d02b1fc8a1c7404562802d1ae41d6aa4eedd8ef1194457eb44cfb3869ff37eaaf2bc9ed1efa07212315bf91b2eae6
-
SSDEEP
192:QL29RBzDzeobchBj8JONqONkEruorEPEjr7Ahh:+29jnbcvYJOHXuovr7Ch
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-