General
-
Target
edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23
-
Size
12KB
-
Sample
240522-z2b1magh3v
-
MD5
222895bb8b7f8c6dfc0f6ab4216378f8
-
SHA1
9e61672b1ba083197d40fda156ed8a7fe360e50d
-
SHA256
edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23
-
SHA512
5455140f3b23941ea98ae8634004d4f54130f42bd5e1f35ce4309606e2522ece9257a9b04111c76635e24dfa81a707da8f69ed8d5a821c310ffb0d8f32deaa84
-
SSDEEP
192:lL29RBzDzeobchBj8JONEONSruErEPEjr7Ahv:d29jnbcvYJO98uEvr7Cv
Static task
static1
Behavioral task
behavioral1
Sample
edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23
-
Size
12KB
-
MD5
222895bb8b7f8c6dfc0f6ab4216378f8
-
SHA1
9e61672b1ba083197d40fda156ed8a7fe360e50d
-
SHA256
edce8b78e8189b63235074fd0f0e5ccc19bb6cf6688b6ba9d29b1519412f8e23
-
SHA512
5455140f3b23941ea98ae8634004d4f54130f42bd5e1f35ce4309606e2522ece9257a9b04111c76635e24dfa81a707da8f69ed8d5a821c310ffb0d8f32deaa84
-
SSDEEP
192:lL29RBzDzeobchBj8JONEONSruErEPEjr7Ahv:d29jnbcvYJO98uEvr7Cv
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-