General
-
Target
b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65
-
Size
12KB
-
Sample
240522-znx1yagc64
-
MD5
4fcee939685d4352cb44b402f3f7fd1d
-
SHA1
b67a08d599e7a2cdf914556e5d69a8fcbdcb6222
-
SHA256
b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65
-
SHA512
ee82da0dfe96b885cf65a4e4b9431316e85cb7707c28dbba1e5ff4f24bc2c019849788b2fe68ac31da6246db2c8e8b8b0b02be300433ab034059e103e5505050
-
SSDEEP
192:ixL29RBzDzeobchBj8JONJONdruqrEPEjr7Ah+:g29jnbcvYJOqPuqvr7C+
Static task
static1
Behavioral task
behavioral1
Sample
b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65
-
Size
12KB
-
MD5
4fcee939685d4352cb44b402f3f7fd1d
-
SHA1
b67a08d599e7a2cdf914556e5d69a8fcbdcb6222
-
SHA256
b0f673b4fbd5d1345abec51f7bf1b64ca37ee66facd848cf3205a5ab82981c65
-
SHA512
ee82da0dfe96b885cf65a4e4b9431316e85cb7707c28dbba1e5ff4f24bc2c019849788b2fe68ac31da6246db2c8e8b8b0b02be300433ab034059e103e5505050
-
SSDEEP
192:ixL29RBzDzeobchBj8JONJONdruqrEPEjr7Ah+:g29jnbcvYJOqPuqvr7C+
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-