General
-
Target
6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da
-
Size
12KB
-
Sample
240522-vhx2jahh3w
-
MD5
1484d55f2792fe5fea92edfcaaee6660
-
SHA1
5ab74cec30c14d8b7c2a100c380283194ff494f0
-
SHA256
6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da
-
SHA512
6b112a15c751d68475c23708f5e92e9926d8e54a4367bc2a7d4abc72cafaa73e356fafb0b9860267389ffb9db44b994b13e8bd79b5faf8f082e0e5be76fb773a
-
SSDEEP
192:QL29RBzDzeobchBj8JONnON1rusrEPEjr7AhA:+29jnbcvYJO4rusvr7CA
Static task
static1
Behavioral task
behavioral1
Sample
6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da
-
Size
12KB
-
MD5
1484d55f2792fe5fea92edfcaaee6660
-
SHA1
5ab74cec30c14d8b7c2a100c380283194ff494f0
-
SHA256
6e94a404fbcfcf6c9ae22a03c00eaa8ad5560bec87164009d625accb839f21da
-
SHA512
6b112a15c751d68475c23708f5e92e9926d8e54a4367bc2a7d4abc72cafaa73e356fafb0b9860267389ffb9db44b994b13e8bd79b5faf8f082e0e5be76fb773a
-
SSDEEP
192:QL29RBzDzeobchBj8JONnON1rusrEPEjr7AhA:+29jnbcvYJO4rusvr7CA
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-