General
-
Target
f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33
-
Size
12KB
-
Sample
240522-yq3tjaee94
-
MD5
662e92bda0142a38ed777f475d431a25
-
SHA1
a3890d18e882d5efc273825493a572a8e78946f9
-
SHA256
f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33
-
SHA512
6d392b4f8956d970b2c9ac9cd7c3d26e6f76b1fad82bc273adc02edb37947614462f54014b73de9f4ab9e93eaedf318e189869f353abb2707cba2ee8565f73fc
-
SSDEEP
192:nBL29RBzDzeobchBj8JONmON4nruurEPEjr7AhN:R29jnbcvYJObMuuvr7CN
Static task
static1
Behavioral task
behavioral1
Sample
f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33
-
Size
12KB
-
MD5
662e92bda0142a38ed777f475d431a25
-
SHA1
a3890d18e882d5efc273825493a572a8e78946f9
-
SHA256
f072a78a6a1bdfa4bbf17e1fbbd0c7af3dd9df84c83baa21651feb464429ba33
-
SHA512
6d392b4f8956d970b2c9ac9cd7c3d26e6f76b1fad82bc273adc02edb37947614462f54014b73de9f4ab9e93eaedf318e189869f353abb2707cba2ee8565f73fc
-
SSDEEP
192:nBL29RBzDzeobchBj8JONmON4nruurEPEjr7AhN:R29jnbcvYJObMuuvr7CN
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-