General
-
Target
880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f
-
Size
12KB
-
Sample
240522-vtvqjsac6s
-
MD5
50d2a1a05d05b15baf3c4864b5dc329b
-
SHA1
d681d7e84d9777fc66072a641eae4a4cfb53b7c3
-
SHA256
880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f
-
SHA512
c0487f6d0754739c07c8fd0c3f137612615a39e131e9eb954e76ae46bf27137f38198585c1ed84d33a16724bd22d05f982e546a47ff727ab4463dcca9f98c706
-
SSDEEP
192:GL29RBzDzeobchBj8JON2ON1rQrulrEPEjr7AhV:o29jnbcvYJO/HrIulvr7CV
Static task
static1
Behavioral task
behavioral1
Sample
880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f
-
Size
12KB
-
MD5
50d2a1a05d05b15baf3c4864b5dc329b
-
SHA1
d681d7e84d9777fc66072a641eae4a4cfb53b7c3
-
SHA256
880ebece77c1e7d66731433d310e7e96cd84430c19d3a7c03f6ef39d5183780f
-
SHA512
c0487f6d0754739c07c8fd0c3f137612615a39e131e9eb954e76ae46bf27137f38198585c1ed84d33a16724bd22d05f982e546a47ff727ab4463dcca9f98c706
-
SSDEEP
192:GL29RBzDzeobchBj8JON2ON1rQrulrEPEjr7AhV:o29jnbcvYJO/HrIulvr7CV
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-