General
-
Target
12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5
-
Size
12KB
-
Sample
240522-z4ymeahb43
-
MD5
b08122fb27cda34d886038b6ec8a1906
-
SHA1
62f2e27b954e3a99795cb7f0400c97885a52368b
-
SHA256
12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5
-
SHA512
d3b984be639b0f21cb29ff5e0899b2dd8e6572be4cd6266d6ab991902a8439fcc726a9c7414f90e8d30916e30865d3c7188fa7ecad7ec05a0c772eed5b6bbada
-
SSDEEP
192:rL29RBzDzeobchBj8JONTONAtrukrEPEjr7Ahk:X29jnbcvYJOw61ukvr7Ck
Static task
static1
Behavioral task
behavioral1
Sample
12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5.xll
Resource
win11-20240419-en
Malware Config
Extracted
Targets
-
-
Target
12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5
-
Size
12KB
-
MD5
b08122fb27cda34d886038b6ec8a1906
-
SHA1
62f2e27b954e3a99795cb7f0400c97885a52368b
-
SHA256
12dc0a48f5bd06d85a1d41c3c489fb33d63f87c7e12001b646c8faa57e5665e5
-
SHA512
d3b984be639b0f21cb29ff5e0899b2dd8e6572be4cd6266d6ab991902a8439fcc726a9c7414f90e8d30916e30865d3c7188fa7ecad7ec05a0c772eed5b6bbada
-
SSDEEP
192:rL29RBzDzeobchBj8JONTONAtrukrEPEjr7Ahk:X29jnbcvYJOw61ukvr7Ck
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-