General
-
Target
54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d
-
Size
12KB
-
Sample
240522-x4rsrade7x
-
MD5
97ce812f36967798872b3b04614848e4
-
SHA1
3a34db882e1c0d4882f3dd927108129cae079b80
-
SHA256
54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d
-
SHA512
90c57bf4a5a67f9ec170abd9c793168872c8759ddd1a27ebb291fe856d1015ff4282143e90c39ade01ea63a5a7269c8d26b3472dd2ec9c477aa833cac80577c7
-
SSDEEP
192:gZL29RBzDzeobchBj8JONmONV+ru7rEPEjr7Ah9:g529jnbcvYJO/mu7vr7C9
Static task
static1
Behavioral task
behavioral1
Sample
54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d
-
Size
12KB
-
MD5
97ce812f36967798872b3b04614848e4
-
SHA1
3a34db882e1c0d4882f3dd927108129cae079b80
-
SHA256
54f2c84b13050ce4dafe54d7a1b463fe85a730d79e31a5098ec906b4b239ed8d
-
SHA512
90c57bf4a5a67f9ec170abd9c793168872c8759ddd1a27ebb291fe856d1015ff4282143e90c39ade01ea63a5a7269c8d26b3472dd2ec9c477aa833cac80577c7
-
SSDEEP
192:gZL29RBzDzeobchBj8JONmONV+ru7rEPEjr7Ah9:g529jnbcvYJO/mu7vr7C9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-