General
-
Target
6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f
-
Size
12KB
-
Sample
240523-a1anqsfc43
-
MD5
cb04460ddd619b8c8ee5640700e68505
-
SHA1
9f82dce8ca6a1bb168792cce87ded691a3af123c
-
SHA256
6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f
-
SHA512
db46926d9e94f9803a94cc3d278265667a3db93df00ab900c28d94c6ebae0575025a132cc212880120c5aec100fbd9d295087c8f1b6b27b0e74adb894f1e9122
-
SSDEEP
192:JL29RBzDzeobchBj8JONdmONlLhruTrEPEjr7Ahf:p29jnbcvYJOFBuTvr7Cf
Static task
static1
Behavioral task
behavioral1
Sample
6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f
-
Size
12KB
-
MD5
cb04460ddd619b8c8ee5640700e68505
-
SHA1
9f82dce8ca6a1bb168792cce87ded691a3af123c
-
SHA256
6e150f6df4b7b928308f5a8142127f42e3b75bf4d3dcb971f3b61d12d565ce5f
-
SHA512
db46926d9e94f9803a94cc3d278265667a3db93df00ab900c28d94c6ebae0575025a132cc212880120c5aec100fbd9d295087c8f1b6b27b0e74adb894f1e9122
-
SSDEEP
192:JL29RBzDzeobchBj8JONdmONlLhruTrEPEjr7Ahf:p29jnbcvYJOFBuTvr7Cf
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-