General
-
Target
6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0
-
Size
12KB
-
Sample
240522-ylsg1aed53
-
MD5
435c2cb51a3ef179fc898a1cdc837840
-
SHA1
f18d15608f54d034de1ce18774f75efacadff91b
-
SHA256
6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0
-
SHA512
902749470883af15247f41803c3e1900c9d3d4289b839d08152505c32ab9c435c85554013e4ecd2fe42f9c7cd022bca4aed00a08cd6496cbe75dc7f96b6e618f
-
SSDEEP
192:nL29RBzDzeobchBj8JON/ONpruzrEPEjr7AhA:L29jnbcvYJOkHuzvr7CA
Static task
static1
Behavioral task
behavioral1
Sample
6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0
-
Size
12KB
-
MD5
435c2cb51a3ef179fc898a1cdc837840
-
SHA1
f18d15608f54d034de1ce18774f75efacadff91b
-
SHA256
6d625efdf977ed6ed8f57122fc5d94f56558b8fbf4494b0ebbf3e948de9ca3a0
-
SHA512
902749470883af15247f41803c3e1900c9d3d4289b839d08152505c32ab9c435c85554013e4ecd2fe42f9c7cd022bca4aed00a08cd6496cbe75dc7f96b6e618f
-
SSDEEP
192:nL29RBzDzeobchBj8JON/ONpruzrEPEjr7AhA:L29jnbcvYJOkHuzvr7CA
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-