General
-
Target
86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d
-
Size
12KB
-
Sample
240522-xyt1xsdc7y
-
MD5
e65fd019137e3d18f60947d9ce89cae9
-
SHA1
1451e2ed4d83d19685f6ca7aa7a861a2efd46c2b
-
SHA256
86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d
-
SHA512
da8fbdd76ba8d47004928013ee52cec689beb0bdbaf98b52e3c9e392c3a9d8c11ca830b9a6f8caf8634b7c3c2f0299b92b87f9728fb0b5fa59abecb346f9412f
-
SSDEEP
192:+L29RBzDzeobchBj8JONLONwwuruwrEPEjr7AhM:w29jnbcvYJOcCwquwvr7CM
Static task
static1
Behavioral task
behavioral1
Sample
86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d
-
Size
12KB
-
MD5
e65fd019137e3d18f60947d9ce89cae9
-
SHA1
1451e2ed4d83d19685f6ca7aa7a861a2efd46c2b
-
SHA256
86d6c2f22d4a7ae7a4947bf0204d3dd15cc3bade3e1f14500629be1528069b3d
-
SHA512
da8fbdd76ba8d47004928013ee52cec689beb0bdbaf98b52e3c9e392c3a9d8c11ca830b9a6f8caf8634b7c3c2f0299b92b87f9728fb0b5fa59abecb346f9412f
-
SSDEEP
192:+L29RBzDzeobchBj8JONLONwwuruwrEPEjr7AhM:w29jnbcvYJOcCwquwvr7CM
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-