General
-
Target
095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5
-
Size
12KB
-
Sample
240522-xjzymacg92
-
MD5
e0dd8486e53842574ab48c83eff4a54d
-
SHA1
840932d4ee8d7d3545b777adf5741bed53d19d01
-
SHA256
095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5
-
SHA512
e7c4d7b4d7e50ae94a140a7ca8a3b440d59bd7a85784b59304a0b640b40a5c7a2ad0e0cb7167f9dcb9f09683975e6917da63cd7032af6b56b04936d373197704
-
SSDEEP
192:2L29RBzDzeobchBj8JONauONsgrNzruqrEPEjr7Ah7e:Y29jnbcvYJOExJrNfuqvr7CS
Static task
static1
Behavioral task
behavioral1
Sample
095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5
-
Size
12KB
-
MD5
e0dd8486e53842574ab48c83eff4a54d
-
SHA1
840932d4ee8d7d3545b777adf5741bed53d19d01
-
SHA256
095b3961d3f4977dcf2dc20e08fce560efb301be1614d41e29607a4179226aa5
-
SHA512
e7c4d7b4d7e50ae94a140a7ca8a3b440d59bd7a85784b59304a0b640b40a5c7a2ad0e0cb7167f9dcb9f09683975e6917da63cd7032af6b56b04936d373197704
-
SSDEEP
192:2L29RBzDzeobchBj8JONauONsgrNzruqrEPEjr7Ah7e:Y29jnbcvYJOExJrNfuqvr7CS
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-