General
-
Target
98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967
-
Size
12KB
-
Sample
240522-zpcrdsgc2s
-
MD5
eb9da3fc33a9f41789575d2f9d208261
-
SHA1
edc6bff045fde03e8d69c280e59ec6adef706ab6
-
SHA256
98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967
-
SHA512
2ea4a5d9e95bb41a862f509798773d3dd3e3327d4b2e4d3cdf7c5cc12600806d2c70cf8cc28c2ca358025705eb7cdbca3621014394d3f8c5c4334ae2a92ca48b
-
SSDEEP
192:zL29RBzDzeobchBj8JONfONGBjru+rEPEjr7AhI:v29jnbcvYJO0wBu+vr7CI
Static task
static1
Behavioral task
behavioral1
Sample
98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967
-
Size
12KB
-
MD5
eb9da3fc33a9f41789575d2f9d208261
-
SHA1
edc6bff045fde03e8d69c280e59ec6adef706ab6
-
SHA256
98d64d63076dfb7891e76c26866a8b8ea02dc35b9bf62428a88af43a19c3e967
-
SHA512
2ea4a5d9e95bb41a862f509798773d3dd3e3327d4b2e4d3cdf7c5cc12600806d2c70cf8cc28c2ca358025705eb7cdbca3621014394d3f8c5c4334ae2a92ca48b
-
SSDEEP
192:zL29RBzDzeobchBj8JONfONGBjru+rEPEjr7AhI:v29jnbcvYJO0wBu+vr7CI
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-