General
-
Target
ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089
-
Size
12KB
-
Sample
240522-yxq4baeg4t
-
MD5
1cb01e40bcc86bd8a1e78551460f85a3
-
SHA1
7df567cb9972a458a169926dfc5241f49f77dba5
-
SHA256
ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089
-
SHA512
2aaa7b951ff87220e2f3a490ce4001edae1a95cd78963262d75dc8cf90c27856428907f533e6fa0ddeb0d4daca9c112dd1d93b1fec3a08088dfc4b38ddeb21a0
-
SSDEEP
192:QL29RBzDzeobchBj8JON2ONXrru0rEPEjr7AhF:+29jnbcvYJOfBHu0vr7CF
Static task
static1
Behavioral task
behavioral1
Sample
ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089
-
Size
12KB
-
MD5
1cb01e40bcc86bd8a1e78551460f85a3
-
SHA1
7df567cb9972a458a169926dfc5241f49f77dba5
-
SHA256
ee4176e5c9375c1d4151d5dc444e1448bba36ddb67a3460dc0ba1d449d0fe089
-
SHA512
2aaa7b951ff87220e2f3a490ce4001edae1a95cd78963262d75dc8cf90c27856428907f533e6fa0ddeb0d4daca9c112dd1d93b1fec3a08088dfc4b38ddeb21a0
-
SSDEEP
192:QL29RBzDzeobchBj8JON2ONXrru0rEPEjr7AhF:+29jnbcvYJOfBHu0vr7CF
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-