General
-
Target
53a47520caf41cd9623e0f75ef712f9e92951d2d706f85d1cf81c5fd8e8d84c3
-
Size
12KB
-
Sample
240522-xfsedacf76
-
MD5
a978beed4b250adfb56ac4ced1e5d725
-
SHA1
2a6735ab5d4a5c3e6e5ab238cc15568e6216c45b
-
SHA256
53a47520caf41cd9623e0f75ef712f9e92951d2d706f85d1cf81c5fd8e8d84c3
-
SHA512
214b40fed7bd7b30cb2c41196bee41e10db4c7900a29f88fa55df12c8406d6475e9a8b91572697447e490b0464dc2608f8359425b46dc06177cac9c39c60f0c0
-
SSDEEP
192:ILL29RBzDzeobchBj8JONHONmi2rubrEPEjr7AhI:I329jnbcvYJOQwiiubvr7CI
Static task
static1
Behavioral task
behavioral1
Sample
53a47520caf41cd9623e0f75ef712f9e92951d2d706f85d1cf81c5fd8e8d84c3.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
53a47520caf41cd9623e0f75ef712f9e92951d2d706f85d1cf81c5fd8e8d84c3.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
53a47520caf41cd9623e0f75ef712f9e92951d2d706f85d1cf81c5fd8e8d84c3
-
Size
12KB
-
MD5
a978beed4b250adfb56ac4ced1e5d725
-
SHA1
2a6735ab5d4a5c3e6e5ab238cc15568e6216c45b
-
SHA256
53a47520caf41cd9623e0f75ef712f9e92951d2d706f85d1cf81c5fd8e8d84c3
-
SHA512
214b40fed7bd7b30cb2c41196bee41e10db4c7900a29f88fa55df12c8406d6475e9a8b91572697447e490b0464dc2608f8359425b46dc06177cac9c39c60f0c0
-
SSDEEP
192:ILL29RBzDzeobchBj8JONHONmi2rubrEPEjr7AhI:I329jnbcvYJOQwiiubvr7CI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-