General
-
Target
6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00
-
Size
12KB
-
Sample
240522-xgwhesce9z
-
MD5
846a3497d741e581c9bf93a6e1e357d7
-
SHA1
e8a9fa0f9948ebbee820e0def6e2e7aa1a77a772
-
SHA256
6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00
-
SHA512
9e265061775e24646d42509f6a400807b98673f504e6c8b27c97e23131bed06211a250dad15d1b0a03cc8eb59e921605c165d1b7b07041c7a0e98691d31ad979
-
SSDEEP
192:zL29RBzDzeobchBj8JONeONhruCrEPEjr7AhF:v29jnbcvYJO33uCvr7CF
Static task
static1
Behavioral task
behavioral1
Sample
6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00
-
Size
12KB
-
MD5
846a3497d741e581c9bf93a6e1e357d7
-
SHA1
e8a9fa0f9948ebbee820e0def6e2e7aa1a77a772
-
SHA256
6e511a0e7edf0d08f16f7c81a07e57f51483396b63e84fe644c9b529a7257f00
-
SHA512
9e265061775e24646d42509f6a400807b98673f504e6c8b27c97e23131bed06211a250dad15d1b0a03cc8eb59e921605c165d1b7b07041c7a0e98691d31ad979
-
SSDEEP
192:zL29RBzDzeobchBj8JONeONhruCrEPEjr7AhF:v29jnbcvYJO33uCvr7CF
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-