General
-
Target
4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc
-
Size
12KB
-
Sample
240522-xchqrsce35
-
MD5
89c02f268f448a1031c0df6da7211c3c
-
SHA1
58fa042a9f53ff7e140d0759965f137d866bfe62
-
SHA256
4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc
-
SHA512
34938959bddeac1c12541d34ae610404254e7dfe76acbcece68d9a4f0c247643274755cf59c2211d8aaaf471db168112817c37c3015c93641288f7bd2ab66539
-
SSDEEP
192:dL29RBzDzeobchBj8JON2ONHruErEPEjr7Ahl:F29jnbcvYJOz5uEvr7Cl
Static task
static1
Behavioral task
behavioral1
Sample
4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc
-
Size
12KB
-
MD5
89c02f268f448a1031c0df6da7211c3c
-
SHA1
58fa042a9f53ff7e140d0759965f137d866bfe62
-
SHA256
4f10b2a30a393d9d762808c1900e0dffc8ca8e2efecc0968a3ec7be1803224bc
-
SHA512
34938959bddeac1c12541d34ae610404254e7dfe76acbcece68d9a4f0c247643274755cf59c2211d8aaaf471db168112817c37c3015c93641288f7bd2ab66539
-
SSDEEP
192:dL29RBzDzeobchBj8JON2ONHruErEPEjr7Ahl:F29jnbcvYJOz5uEvr7Cl
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-