General
-
Target
896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e
-
Size
12KB
-
Sample
240522-wpvqesbc85
-
MD5
a671ee2e2da907a68af5266f8b2fab3e
-
SHA1
3e5e041861266ee539e378baf79aef4f5697e129
-
SHA256
896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e
-
SHA512
c02dc05394f8a0119b113dd7688459960d88e1b2408fd2448ad8de6731480aee1c8864ec7fe00279b7207b157be43e58cdd04bb0d2fe53b1d37b812b78050bbf
-
SSDEEP
192:pL29RBzDzeobchBj8JON/ONhruErEPEjr7Ahw:J29jnbcvYJOAPuEvr7Cw
Static task
static1
Behavioral task
behavioral1
Sample
896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e
-
Size
12KB
-
MD5
a671ee2e2da907a68af5266f8b2fab3e
-
SHA1
3e5e041861266ee539e378baf79aef4f5697e129
-
SHA256
896bc34db15097ee7b1b1d736a6348202c537320a76c9e972d077be1b8fdbd7e
-
SHA512
c02dc05394f8a0119b113dd7688459960d88e1b2408fd2448ad8de6731480aee1c8864ec7fe00279b7207b157be43e58cdd04bb0d2fe53b1d37b812b78050bbf
-
SSDEEP
192:pL29RBzDzeobchBj8JON/ONhruErEPEjr7Ahw:J29jnbcvYJOAPuEvr7Cw
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-