General
-
Target
147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a
-
Size
12KB
-
Sample
240522-wgpjfaba2v
-
MD5
0ad007b299dcf86e22965d0f3830d793
-
SHA1
8ba635452a8ecbfd63a041c9b45dacf4442eaa6d
-
SHA256
147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a
-
SHA512
79b89f9f37ab7662bf62441c4d4681623c6c91ea4715742f62e1e42be80e6cc40efd6ac03d6e9052eb5a4dd574f8416c76044da3c7693c3b63000c5f4a1a767e
-
SSDEEP
192:A4L29RBzDzeobchBj8JONrONCruBrEPEjr7Ahs:l29jnbcvYJOcwuBvr7Cs
Static task
static1
Behavioral task
behavioral1
Sample
147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a
-
Size
12KB
-
MD5
0ad007b299dcf86e22965d0f3830d793
-
SHA1
8ba635452a8ecbfd63a041c9b45dacf4442eaa6d
-
SHA256
147205c24565ec35536ebf7b07974d5d7342e5821cd903390220d8738006b16a
-
SHA512
79b89f9f37ab7662bf62441c4d4681623c6c91ea4715742f62e1e42be80e6cc40efd6ac03d6e9052eb5a4dd574f8416c76044da3c7693c3b63000c5f4a1a767e
-
SSDEEP
192:A4L29RBzDzeobchBj8JONrONCruBrEPEjr7Ahs:l29jnbcvYJOcwuBvr7Cs
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-