General
-
Target
4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38
-
Size
12KB
-
Sample
240522-xhbjmscg44
-
MD5
dc0495b8e4d1f9ed129a61ee34997832
-
SHA1
ea9aeac5d36f34518e2c7df0c44cb68ea4df802c
-
SHA256
4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38
-
SHA512
ed2ad2cf1147c74fe44a4b251759d986935d149a8763564d34f888e7f1364b40f7538fa54d182b4cac074e5c6ba564a758bcb0d52befc4ff26f1cbdc1f209676
-
SSDEEP
192:dL29RBzDzeobchBj8JONoONMru9rEPEjr7Ahj:F29jnbcvYJOx2u9vr7Cj
Static task
static1
Behavioral task
behavioral1
Sample
4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38
-
Size
12KB
-
MD5
dc0495b8e4d1f9ed129a61ee34997832
-
SHA1
ea9aeac5d36f34518e2c7df0c44cb68ea4df802c
-
SHA256
4fa546f42266699d9a4ea26b6ce4e1dd2e3c8c86dbfd37441eebdcde9e1b4e38
-
SHA512
ed2ad2cf1147c74fe44a4b251759d986935d149a8763564d34f888e7f1364b40f7538fa54d182b4cac074e5c6ba564a758bcb0d52befc4ff26f1cbdc1f209676
-
SSDEEP
192:dL29RBzDzeobchBj8JONoONMru9rEPEjr7Ahj:F29jnbcvYJOx2u9vr7Cj
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-