General
-
Target
eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5
-
Size
12KB
-
Sample
240522-xpwhdsda59
-
MD5
9201d79ee99e0629dba0d1ee8cbad7b3
-
SHA1
562902dc98f5f74e8fe9a8d43ff44212df1f2a19
-
SHA256
eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5
-
SHA512
80929a58e9c8ac612f7fc7ac8d73c0fbd8f98746d45270d94fe54e6147f0dbb12eb2ab13945b39b92c8dc405e7b2b9e831751d46522e472538fe141576985f53
-
SSDEEP
192:BL29RBzDzeobchBj8JONmONGSru2rEPEjr7Ahd:R29jnbcvYJOjDu2vr7Cd
Static task
static1
Behavioral task
behavioral1
Sample
eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5
-
Size
12KB
-
MD5
9201d79ee99e0629dba0d1ee8cbad7b3
-
SHA1
562902dc98f5f74e8fe9a8d43ff44212df1f2a19
-
SHA256
eb492159e649e4507d01867a9cd8a7eb8b58c911d4855ce747fba1debd3e7cf5
-
SHA512
80929a58e9c8ac612f7fc7ac8d73c0fbd8f98746d45270d94fe54e6147f0dbb12eb2ab13945b39b92c8dc405e7b2b9e831751d46522e472538fe141576985f53
-
SSDEEP
192:BL29RBzDzeobchBj8JONmONGSru2rEPEjr7Ahd:R29jnbcvYJOjDu2vr7Cd
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-