General
-
Target
8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb
-
Size
12KB
-
Sample
240522-z8vrbahd58
-
MD5
3afaa797525067cc5d7c074b42e1d2c4
-
SHA1
a97b11a7caa41f08da29273b76dc9a1eed99de81
-
SHA256
8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb
-
SHA512
747127aaff415f0ddab4f960b55a69c78605521d147b92d584cedad960a2d6604ceb4a89459f973b232fa6208ea091dc8b9b817d002d5738d6871feb84bc5eb6
-
SSDEEP
192:6L29RBzDzeobchBj8JONTON8DJrumgrEPEjr7Ahk:k29jnbcvYJOEmdumgvr7Ck
Static task
static1
Behavioral task
behavioral1
Sample
8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb
-
Size
12KB
-
MD5
3afaa797525067cc5d7c074b42e1d2c4
-
SHA1
a97b11a7caa41f08da29273b76dc9a1eed99de81
-
SHA256
8db507bdc3d32fb0f2d600dd74ab128a63f60f8d4bb4b9029417cfbba3cf1afb
-
SHA512
747127aaff415f0ddab4f960b55a69c78605521d147b92d584cedad960a2d6604ceb4a89459f973b232fa6208ea091dc8b9b817d002d5738d6871feb84bc5eb6
-
SSDEEP
192:6L29RBzDzeobchBj8JONTON8DJrumgrEPEjr7Ahk:k29jnbcvYJOEmdumgvr7Ck
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-