General
-
Target
f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1
-
Size
12KB
-
Sample
240522-y9rwdafd6z
-
MD5
414797251bcc0b0c3cdd0b6bcb4e1a38
-
SHA1
dbdf50c20d9345e7633fc41072b6e32b5c1e012f
-
SHA256
f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1
-
SHA512
f2532611529d9b28c9a2e6fd63e619fcf98961d53d069acd30b71f5ac294d90bd2a091e7218da6d1c9552eaa744c249b25553c28bc9946c9f156f9f8d5c1fff1
-
SSDEEP
192:FL29RBzDzeobchBj8JONRONVP0sTrucrEPEjr7AhTa:929jnbcvYJOOXP0s/ucvr7Cm
Static task
static1
Behavioral task
behavioral1
Sample
f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1
-
Size
12KB
-
MD5
414797251bcc0b0c3cdd0b6bcb4e1a38
-
SHA1
dbdf50c20d9345e7633fc41072b6e32b5c1e012f
-
SHA256
f20ec161e75b8d35c9c6b4204f2d7f2749c127fa75aa1ae9d186c620023ee7b1
-
SHA512
f2532611529d9b28c9a2e6fd63e619fcf98961d53d069acd30b71f5ac294d90bd2a091e7218da6d1c9552eaa744c249b25553c28bc9946c9f156f9f8d5c1fff1
-
SSDEEP
192:FL29RBzDzeobchBj8JONRONVP0sTrucrEPEjr7AhTa:929jnbcvYJOOXP0s/ucvr7Cm
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-