General
-
Target
8c892c2c62941be59ece9f17ec82516cc5da2de3c3095e14ce0341133aa975f5
-
Size
12KB
-
Sample
240522-xjrx1scg85
-
MD5
9b587fbef38f14176802b14945207b85
-
SHA1
a54ed40ffa2fe39432fbc9c79533a3f540c601a1
-
SHA256
8c892c2c62941be59ece9f17ec82516cc5da2de3c3095e14ce0341133aa975f5
-
SHA512
75dc9d775d1a79d9fa9f96ff695a448f8b8063ca597a15a66db6e26d38f10acfde26e12193ba63b6315696daf28196a683c6640b726cd132db5a3cf1199348d7
-
SSDEEP
192:aL29RBzDzeobchBj8JONRONeruNrEPEjr7Ah2:E29jnbcvYJOq0uNvr7C2
Static task
static1
Behavioral task
behavioral1
Sample
8c892c2c62941be59ece9f17ec82516cc5da2de3c3095e14ce0341133aa975f5.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
8c892c2c62941be59ece9f17ec82516cc5da2de3c3095e14ce0341133aa975f5.xll
Resource
win11-20240419-en
Malware Config
Extracted
Targets
-
-
Target
8c892c2c62941be59ece9f17ec82516cc5da2de3c3095e14ce0341133aa975f5
-
Size
12KB
-
MD5
9b587fbef38f14176802b14945207b85
-
SHA1
a54ed40ffa2fe39432fbc9c79533a3f540c601a1
-
SHA256
8c892c2c62941be59ece9f17ec82516cc5da2de3c3095e14ce0341133aa975f5
-
SHA512
75dc9d775d1a79d9fa9f96ff695a448f8b8063ca597a15a66db6e26d38f10acfde26e12193ba63b6315696daf28196a683c6640b726cd132db5a3cf1199348d7
-
SSDEEP
192:aL29RBzDzeobchBj8JONRONeruNrEPEjr7Ah2:E29jnbcvYJOq0uNvr7C2
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-