General
-
Target
1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd
-
Size
12KB
-
Sample
240522-xplm7ach6y
-
MD5
662ed81d78b491febe0d37968c40e0b6
-
SHA1
d9815f60a72425d0253799bcb1a7b9a7abab5628
-
SHA256
1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd
-
SHA512
59f9d6d68a492777948f730f1dff50183f35445c5d44580f049e40e4a6965a36ec42cebb006d6910e2754d7d0f9ddf00cb208c60584320f79a12c5a03bba0e4f
-
SSDEEP
192:JL29RBzDzeobchBj8JONEONrrubrEPEjr7AhP:p29jnbcvYJOhJubvr7CP
Static task
static1
Behavioral task
behavioral1
Sample
1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd
-
Size
12KB
-
MD5
662ed81d78b491febe0d37968c40e0b6
-
SHA1
d9815f60a72425d0253799bcb1a7b9a7abab5628
-
SHA256
1a0dfdc8ef32278e6a14498a39b067b2448d91e6445089c00e99cc2f7f883bbd
-
SHA512
59f9d6d68a492777948f730f1dff50183f35445c5d44580f049e40e4a6965a36ec42cebb006d6910e2754d7d0f9ddf00cb208c60584320f79a12c5a03bba0e4f
-
SSDEEP
192:JL29RBzDzeobchBj8JONEONrrubrEPEjr7AhP:p29jnbcvYJOhJubvr7CP
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-