General
-
Target
f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3
-
Size
12KB
-
Sample
240522-y5xk3afc88
-
MD5
2a8b603d6c802cb45152f7dc80cc22c4
-
SHA1
1a99bfd8e4f699c27666ea26545f7551f652030e
-
SHA256
f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3
-
SHA512
2d8d5b0c1e26f6f38f74be8b50d6bf1776a921fe1248820952da4e0ea0da1b6978fb56fdd6666b3ce61b6740bc2fbfc0cf3cb23025950a2dcf88da7ec4b59081
-
SSDEEP
192:CL29RBzDzeobchBj8JONn+ON1kIrusrEPEjr7Ah9:c29jnbcvYJOznkQusvr7C9
Static task
static1
Behavioral task
behavioral1
Sample
f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3
-
Size
12KB
-
MD5
2a8b603d6c802cb45152f7dc80cc22c4
-
SHA1
1a99bfd8e4f699c27666ea26545f7551f652030e
-
SHA256
f607972e6a68978d8c0b3447becf63814384d214455b1fdedf5272c09db54fc3
-
SHA512
2d8d5b0c1e26f6f38f74be8b50d6bf1776a921fe1248820952da4e0ea0da1b6978fb56fdd6666b3ce61b6740bc2fbfc0cf3cb23025950a2dcf88da7ec4b59081
-
SSDEEP
192:CL29RBzDzeobchBj8JONn+ON1kIrusrEPEjr7Ah9:c29jnbcvYJOznkQusvr7C9
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-