General
-
Target
a03a20fc2898ff955cfaf4bd8d6c394eacbe69625648481b230b215d0d4e13d0
-
Size
12KB
-
Sample
240522-xt65padc53
-
MD5
6933ef4b10bd2befac14d74c5152a425
-
SHA1
7ab4824c880089e576a33e92894ce0fe5d27e3a7
-
SHA256
a03a20fc2898ff955cfaf4bd8d6c394eacbe69625648481b230b215d0d4e13d0
-
SHA512
537bb828dea38825d05e7da6d11bff46e100a8d80915fcd06e590efc7ea6a45134408918611173ffd298d6bbbc3dd1232754038a619b189017c1179c3ddfa3ec
-
SSDEEP
192:kL29RBzDzeobchBj8JONSONTvruCrEPEjr7Ahp:q29jnbcvYJOvxuCvr7Cp
Static task
static1
Behavioral task
behavioral1
Sample
a03a20fc2898ff955cfaf4bd8d6c394eacbe69625648481b230b215d0d4e13d0.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
a03a20fc2898ff955cfaf4bd8d6c394eacbe69625648481b230b215d0d4e13d0.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
a03a20fc2898ff955cfaf4bd8d6c394eacbe69625648481b230b215d0d4e13d0
-
Size
12KB
-
MD5
6933ef4b10bd2befac14d74c5152a425
-
SHA1
7ab4824c880089e576a33e92894ce0fe5d27e3a7
-
SHA256
a03a20fc2898ff955cfaf4bd8d6c394eacbe69625648481b230b215d0d4e13d0
-
SHA512
537bb828dea38825d05e7da6d11bff46e100a8d80915fcd06e590efc7ea6a45134408918611173ffd298d6bbbc3dd1232754038a619b189017c1179c3ddfa3ec
-
SSDEEP
192:kL29RBzDzeobchBj8JONSONTvruCrEPEjr7Ahp:q29jnbcvYJOvxuCvr7Cp
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-