General
-
Target
1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec
-
Size
12KB
-
Sample
240522-zj7dtafh8x
-
MD5
41adaf16b1b0ebe0107199b31de9808c
-
SHA1
cd30baea039de08479d00a62f8ad04d9516eb5b3
-
SHA256
1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec
-
SHA512
2b19ac1bcb5809696b17316d1d79ae79531a558b1ab7311b32deb7f63cb7113d865f5bbdc14a9ba42dd36fa91f3952dc21ba7e65dbded3c85b7a7eeeb3e76949
-
SSDEEP
192:wL29RBzDzeobchBj8JON4ONjwruxrEPEjr7Ah7:e29jnbcvYJOlJouxvr7C7
Static task
static1
Behavioral task
behavioral1
Sample
1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec
-
Size
12KB
-
MD5
41adaf16b1b0ebe0107199b31de9808c
-
SHA1
cd30baea039de08479d00a62f8ad04d9516eb5b3
-
SHA256
1c1ac0e5365dd6d944ce06dac8d5f05ac4a457510258312d9231b1c7258406ec
-
SHA512
2b19ac1bcb5809696b17316d1d79ae79531a558b1ab7311b32deb7f63cb7113d865f5bbdc14a9ba42dd36fa91f3952dc21ba7e65dbded3c85b7a7eeeb3e76949
-
SSDEEP
192:wL29RBzDzeobchBj8JON4ONjwruxrEPEjr7Ah7:e29jnbcvYJOlJouxvr7C7
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-