General
-
Target
8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e
-
Size
12KB
-
Sample
240523-a652tsfe77
-
MD5
5782bce05a477af3d8504a4ea8854f54
-
SHA1
2d795f303173b858063166709fd5852c7cf3499b
-
SHA256
8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e
-
SHA512
3715862c3e61d1502b5b0a524e1a15c7c0acc15c0db392c5b312bd6f7a8951197c2c3c3ae0bc082fffdb5080a4184a8732742e1bdab63140ccf9cc00e2008eb9
-
SSDEEP
192:ZL29RBzDzeobchBj8JONiONgruCrEPEjr7Ahx:529jnbcvYJODiuCvr7Cx
Static task
static1
Behavioral task
behavioral1
Sample
8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e
-
Size
12KB
-
MD5
5782bce05a477af3d8504a4ea8854f54
-
SHA1
2d795f303173b858063166709fd5852c7cf3499b
-
SHA256
8405485f0e444b4788b3485d56eb1d7a79afcf6f5896268b4c26b3ba070c913e
-
SHA512
3715862c3e61d1502b5b0a524e1a15c7c0acc15c0db392c5b312bd6f7a8951197c2c3c3ae0bc082fffdb5080a4184a8732742e1bdab63140ccf9cc00e2008eb9
-
SSDEEP
192:ZL29RBzDzeobchBj8JONiONgruCrEPEjr7Ahx:529jnbcvYJODiuCvr7Cx
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-