General
-
Target
5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d
-
Size
12KB
-
Sample
240522-ywwmeaeh48
-
MD5
c309340e70edde1973ad3a93abedefed
-
SHA1
569c950194c239fc62223c55bc18f1fb49491764
-
SHA256
5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d
-
SHA512
7075d6e7bb449a8a5b2d2fd5fd029bd357b872c0f65ab79079198f04886c6b4c286ad76e413ba4d2da268fd1bf6137b6ae95ce6f01ce5e4cda841035b88f334c
-
SSDEEP
192:7YL29RBzDzeobchBj8JONSONsru6rEPEjr7Ahp:a29jnbcvYJOvyu6vr7Cp
Static task
static1
Behavioral task
behavioral1
Sample
5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d
-
Size
12KB
-
MD5
c309340e70edde1973ad3a93abedefed
-
SHA1
569c950194c239fc62223c55bc18f1fb49491764
-
SHA256
5196097bab8d30bb29186087a39a6d2592a1919e070c35c905e8ced6eb15b73d
-
SHA512
7075d6e7bb449a8a5b2d2fd5fd029bd357b872c0f65ab79079198f04886c6b4c286ad76e413ba4d2da268fd1bf6137b6ae95ce6f01ce5e4cda841035b88f334c
-
SSDEEP
192:7YL29RBzDzeobchBj8JONSONsru6rEPEjr7Ahp:a29jnbcvYJOvyu6vr7Cp
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-