General
-
Target
4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092
-
Size
12KB
-
Sample
240522-y49h8sfc65
-
MD5
65ca2b881b48edcc5d49a54b1bc2b703
-
SHA1
9641ff17e210fad862d079ee8e5f2564f0914a8f
-
SHA256
4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092
-
SHA512
2d54f7bb4898b63fbae0aa91b93d0647e9807fb935399d269726266555b3e1ab1051d7e5c2f0c4c81e947d0e7d0033e747d8ce8b019f771927b177ec3911c6ec
-
SSDEEP
192:hL29RBzDzeobchBj8JONRONlkGru2rEPEjr7Ahm:x29jnbcvYJOOzkyu2vr7Cm
Static task
static1
Behavioral task
behavioral1
Sample
4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092
-
Size
12KB
-
MD5
65ca2b881b48edcc5d49a54b1bc2b703
-
SHA1
9641ff17e210fad862d079ee8e5f2564f0914a8f
-
SHA256
4f410594437bf02de068107de9af232b4d5996ee8c95760397ac4d2e4edbf092
-
SHA512
2d54f7bb4898b63fbae0aa91b93d0647e9807fb935399d269726266555b3e1ab1051d7e5c2f0c4c81e947d0e7d0033e747d8ce8b019f771927b177ec3911c6ec
-
SSDEEP
192:hL29RBzDzeobchBj8JONRONlkGru2rEPEjr7Ahm:x29jnbcvYJOOzkyu2vr7Cm
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-