General
-
Target
0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678
-
Size
12KB
-
Sample
240522-x1p5rade29
-
MD5
009e0d9c56b240aa90bbb605db9b7aba
-
SHA1
001b10c580b2dd8d6ab6755ee0bc1101e39e427b
-
SHA256
0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678
-
SHA512
063f3a8fde1ab9abbf9f963eaf0f56bacc4524fbf344fcc911406cd263e3cb8e8052a0247426f9d8ee224a3c09ba75e59153e931d4f9f07334d5b5d7c88b7282
-
SSDEEP
192:oL29RBzDzeobchBj8JONfONJOruNrEPEjr7AhQ:m29jnbcvYJOk7KuNvr7CQ
Static task
static1
Behavioral task
behavioral1
Sample
0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678
-
Size
12KB
-
MD5
009e0d9c56b240aa90bbb605db9b7aba
-
SHA1
001b10c580b2dd8d6ab6755ee0bc1101e39e427b
-
SHA256
0fcb5cc23cd3843623e47bf51937599d75bb1a8be7dc72fefe12ee8a0045d678
-
SHA512
063f3a8fde1ab9abbf9f963eaf0f56bacc4524fbf344fcc911406cd263e3cb8e8052a0247426f9d8ee224a3c09ba75e59153e931d4f9f07334d5b5d7c88b7282
-
SSDEEP
192:oL29RBzDzeobchBj8JONfONJOruNrEPEjr7AhQ:m29jnbcvYJOk7KuNvr7CQ
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-