General
-
Target
45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7
-
Size
12KB
-
Sample
240523-ag29msed75
-
MD5
6c93094ce7e68105d2649782011ae102
-
SHA1
cdcd50d7485aadd52968427808ff46dae934f8d0
-
SHA256
45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7
-
SHA512
237efad5fb9d8f003c74832df37d21e3c6a08385905d0e37d6313f6725a56cdac6bfd2405251e1205a7cdc299a1bd3f1a6228bc00ebaaa18582c40eb837721cb
-
SSDEEP
192:WL29RBzDzeobchBj8JONjONnru8rEPEjr7Ahc:429jnbcvYJOk9u8vr7Cc
Static task
static1
Behavioral task
behavioral1
Sample
45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7
-
Size
12KB
-
MD5
6c93094ce7e68105d2649782011ae102
-
SHA1
cdcd50d7485aadd52968427808ff46dae934f8d0
-
SHA256
45fd5eb94af960942d55634a681121a29303f8682442df255f38f0fb03a516b7
-
SHA512
237efad5fb9d8f003c74832df37d21e3c6a08385905d0e37d6313f6725a56cdac6bfd2405251e1205a7cdc299a1bd3f1a6228bc00ebaaa18582c40eb837721cb
-
SSDEEP
192:WL29RBzDzeobchBj8JONjONnru8rEPEjr7Ahc:429jnbcvYJOk9u8vr7Cc
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-