General
-
Target
e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee
-
Size
12KB
-
Sample
240523-ab3yzsea7x
-
MD5
7fe6a98a952d9f7ef315940c6c95264a
-
SHA1
bb45b80134d00faefb6c6f4d4d582d9b1a17ce59
-
SHA256
e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee
-
SHA512
4343dbbc6e019cb21445b6a10f806c551945f51a9a1e89c296c9536d74f0a7b07dc459072aad74393167790807562d6adb505ec16031bc921337431da2dfcd47
-
SSDEEP
192:rL29RBzDzeobchBj8JONpONDrunrEPEjr7Ahu:X29jnbcvYJOyBunvr7Cu
Static task
static1
Behavioral task
behavioral1
Sample
e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee
-
Size
12KB
-
MD5
7fe6a98a952d9f7ef315940c6c95264a
-
SHA1
bb45b80134d00faefb6c6f4d4d582d9b1a17ce59
-
SHA256
e3806738db28db9218f5c71fba9876116a68e19a6bb5fa19059279c3c26036ee
-
SHA512
4343dbbc6e019cb21445b6a10f806c551945f51a9a1e89c296c9536d74f0a7b07dc459072aad74393167790807562d6adb505ec16031bc921337431da2dfcd47
-
SSDEEP
192:rL29RBzDzeobchBj8JONpONDrunrEPEjr7Ahu:X29jnbcvYJOyBunvr7Cu
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-