General
-
Target
e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb
-
Size
12KB
-
Sample
240522-vglxwahg7z
-
MD5
cc273a91c7a37310d8bcf03c5dd26a42
-
SHA1
e53ca2f70b5fff24afe42c82e84d939627513db8
-
SHA256
e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb
-
SHA512
f3d62f54eed1bac2280b2f1c11523c0067efaff5602522b4254fc6c93b3c74dd3fd74c6b8366be279cf47fedb31351708910ccd70ab4a840abfb9740f83800c0
-
SSDEEP
192:YL29RBzDzeobchBj8JONoONAruYrEPEjr7Ahr:W29jnbcvYJO9KuYvr7Cr
Static task
static1
Behavioral task
behavioral1
Sample
e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb
-
Size
12KB
-
MD5
cc273a91c7a37310d8bcf03c5dd26a42
-
SHA1
e53ca2f70b5fff24afe42c82e84d939627513db8
-
SHA256
e9ef8e986d7b42387e0c1ed60195bd441023157e39c62f3fa4854d479d94ebdb
-
SHA512
f3d62f54eed1bac2280b2f1c11523c0067efaff5602522b4254fc6c93b3c74dd3fd74c6b8366be279cf47fedb31351708910ccd70ab4a840abfb9740f83800c0
-
SSDEEP
192:YL29RBzDzeobchBj8JONoONAruYrEPEjr7Ahr:W29jnbcvYJO9KuYvr7Cr
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-