General
-
Target
0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37
-
Size
12KB
-
Sample
240522-whbzqsba83
-
MD5
e67ebcd47b3df4e31662a5a5d0d50154
-
SHA1
f96842bb192c4bbe064c295c81df874b94ca103f
-
SHA256
0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37
-
SHA512
c9bf8b504a860ca7a6959b4a8e3328f01dce11231edc9451f8771a8504ddf8db7cf346399ddc11c15ee833d94e2229c2e62e7259f0c0c5e636fce333a04d2f4e
-
SSDEEP
192:8L29RBzDzeobchBj8JONLONcruBrEPEjr7Ah8:S29jnbcvYJO8OuBvr7C8
Static task
static1
Behavioral task
behavioral1
Sample
0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37
-
Size
12KB
-
MD5
e67ebcd47b3df4e31662a5a5d0d50154
-
SHA1
f96842bb192c4bbe064c295c81df874b94ca103f
-
SHA256
0a0fc3e0330ac3e5b77963c535cf92824f729b03e53a4d5f8729eed9df68aa37
-
SHA512
c9bf8b504a860ca7a6959b4a8e3328f01dce11231edc9451f8771a8504ddf8db7cf346399ddc11c15ee833d94e2229c2e62e7259f0c0c5e636fce333a04d2f4e
-
SSDEEP
192:8L29RBzDzeobchBj8JONLONcruBrEPEjr7Ah8:S29jnbcvYJO8OuBvr7C8
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-