General
-
Target
382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee
-
Size
12KB
-
Sample
240522-xvzf8sdc76
-
MD5
545e8949e7aad7feada494f2958c53b3
-
SHA1
cf35bd96fd36db6a56b2dfb0fa7b15bb19fc47d2
-
SHA256
382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee
-
SHA512
cf242edffe1ae3feb0e8d9c031512fbe72b42125184f5cf2fe6b31ffb258ec8c2385bd9d3bbdfe9d4292815d8c34e157727952b5a3d84cd80313485dd008ff1b
-
SSDEEP
192:hL29RBzDzeobchBj8JONhONZPELruerEPEjr7Ah+:x29jnbcvYJO2Wuevr7C+
Static task
static1
Behavioral task
behavioral1
Sample
382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee.xll
Resource
win11-20240419-en
Malware Config
Extracted
Targets
-
-
Target
382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee
-
Size
12KB
-
MD5
545e8949e7aad7feada494f2958c53b3
-
SHA1
cf35bd96fd36db6a56b2dfb0fa7b15bb19fc47d2
-
SHA256
382e6a2df4a1ee0afad92185e0f7612e52984d107e778558109fb9c18d0a0fee
-
SHA512
cf242edffe1ae3feb0e8d9c031512fbe72b42125184f5cf2fe6b31ffb258ec8c2385bd9d3bbdfe9d4292815d8c34e157727952b5a3d84cd80313485dd008ff1b
-
SSDEEP
192:hL29RBzDzeobchBj8JONhONZPELruerEPEjr7Ah+:x29jnbcvYJO2Wuevr7C+
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-