General
-
Target
aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d
-
Size
12KB
-
Sample
240522-yrywzaee2w
-
MD5
6e41142ca70f1522569c9027d17da4d4
-
SHA1
e37b58e2f87ad477859dd3f5ccdc890edcb5598a
-
SHA256
aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d
-
SHA512
20dd343e9f458087e9c34734960063c3cf658c71adf148be4001200b63c11cc56648d6a0fcb7319b055c946021df9f5574cd6ac0fbf45e829f662677e1aecb98
-
SSDEEP
192:sL29RBzDzeobchBj8JONqONnv/mruArEPEjr7AhR:C29jnbcvYJOndSuAvr7CR
Static task
static1
Behavioral task
behavioral1
Sample
aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d
-
Size
12KB
-
MD5
6e41142ca70f1522569c9027d17da4d4
-
SHA1
e37b58e2f87ad477859dd3f5ccdc890edcb5598a
-
SHA256
aecc1cd51cc19653cdd816017f3d7fa6002b1349746388200a92fa2cecdf105d
-
SHA512
20dd343e9f458087e9c34734960063c3cf658c71adf148be4001200b63c11cc56648d6a0fcb7319b055c946021df9f5574cd6ac0fbf45e829f662677e1aecb98
-
SSDEEP
192:sL29RBzDzeobchBj8JONqONnv/mruArEPEjr7AhR:C29jnbcvYJOndSuAvr7CR
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-