General
-
Target
2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0
-
Size
12KB
-
Sample
240522-z96j7she27
-
MD5
570ab831bb4d931d62403749f4806f53
-
SHA1
8be0f8980ce16c2111129779445b700310dc6ab1
-
SHA256
2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0
-
SHA512
0150850714af5cc1b3ecc94fe037ba7cbd97bc367ac1d0c0d7ae1dbf6574e0a98ca8d42ce4f3799420fde823c7ccd1bb2b80b4f9c53ab129976962dd7f32e541
-
SSDEEP
192:UL29RBzDzeobchBj8JONwONiZurusrEPEjr7Ahr:a29jnbcvYJON9usvr7Cr
Static task
static1
Behavioral task
behavioral1
Sample
2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0.xll
Resource
win11-20240419-en
Malware Config
Extracted
Targets
-
-
Target
2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0
-
Size
12KB
-
MD5
570ab831bb4d931d62403749f4806f53
-
SHA1
8be0f8980ce16c2111129779445b700310dc6ab1
-
SHA256
2a0a515b531e0c46461af48847f653b44393a5cb686f7bc5eb1874ffd72a70f0
-
SHA512
0150850714af5cc1b3ecc94fe037ba7cbd97bc367ac1d0c0d7ae1dbf6574e0a98ca8d42ce4f3799420fde823c7ccd1bb2b80b4f9c53ab129976962dd7f32e541
-
SSDEEP
192:UL29RBzDzeobchBj8JONwONiZurusrEPEjr7Ahr:a29jnbcvYJON9usvr7Cr
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-