General
-
Target
6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929
-
Size
12KB
-
Sample
240522-xqcrnsda74
-
MD5
6bd0a5bc3ce49df751d187d6879f6ff3
-
SHA1
4e66b13da6c1013769d676193e629d7a84c6c5cb
-
SHA256
6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929
-
SHA512
993357d765726aa3e314452cfb4ccb534e426d81becde276b9aae5212c572c0986a1f0c831898f9edf1798a52bf07fe90c751c477ef473837591115b72c7b8e6
-
SSDEEP
192:JL29RBzDzeobchBj8JONHONsruSrEPEjr7AhY:p29jnbcvYJOYGuSvr7CY
Static task
static1
Behavioral task
behavioral1
Sample
6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929.xll
Resource
win11-20240419-en
Malware Config
Extracted
Targets
-
-
Target
6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929
-
Size
12KB
-
MD5
6bd0a5bc3ce49df751d187d6879f6ff3
-
SHA1
4e66b13da6c1013769d676193e629d7a84c6c5cb
-
SHA256
6ef065b3ecade2b9ad36b644c177aa41f3b4d9da662fc710a403191187485929
-
SHA512
993357d765726aa3e314452cfb4ccb534e426d81becde276b9aae5212c572c0986a1f0c831898f9edf1798a52bf07fe90c751c477ef473837591115b72c7b8e6
-
SSDEEP
192:JL29RBzDzeobchBj8JONHONsruSrEPEjr7AhY:p29jnbcvYJOYGuSvr7CY
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-