General
-
Target
dd30ef5c8f778b0411d52a027ae4371bb3d87e3319b503de7fb88a15f45be041
-
Size
12KB
-
Sample
240522-xtytbadc43
-
MD5
49d78ead1a3aaac1f187b5fcbcbcff16
-
SHA1
26b92ccfb4d6aefed12cee7472614a3a42423163
-
SHA256
dd30ef5c8f778b0411d52a027ae4371bb3d87e3319b503de7fb88a15f45be041
-
SHA512
54d5c3b63d02e318aed5d12932a997a091a6b36b02c444a16cf32d66c55134ac75f5de0e9a606045d16d657e125ce9d44915ae0fc6430383c3eef5b861a73331
-
SSDEEP
192:B1DL29RBzDzeobchBj8JONmcpnON1j/JZZzcw808Uscc5ruMrEPEjr7AhjA9:D/29jnbcvYJOoouMvr7Cc
Static task
static1
Behavioral task
behavioral1
Sample
dd30ef5c8f778b0411d52a027ae4371bb3d87e3319b503de7fb88a15f45be041.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
dd30ef5c8f778b0411d52a027ae4371bb3d87e3319b503de7fb88a15f45be041.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
dd30ef5c8f778b0411d52a027ae4371bb3d87e3319b503de7fb88a15f45be041
-
Size
12KB
-
MD5
49d78ead1a3aaac1f187b5fcbcbcff16
-
SHA1
26b92ccfb4d6aefed12cee7472614a3a42423163
-
SHA256
dd30ef5c8f778b0411d52a027ae4371bb3d87e3319b503de7fb88a15f45be041
-
SHA512
54d5c3b63d02e318aed5d12932a997a091a6b36b02c444a16cf32d66c55134ac75f5de0e9a606045d16d657e125ce9d44915ae0fc6430383c3eef5b861a73331
-
SSDEEP
192:B1DL29RBzDzeobchBj8JONmcpnON1j/JZZzcw808Uscc5ruMrEPEjr7AhjA9:D/29jnbcvYJOoouMvr7Cc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-