General
-
Target
496a0e268e8fc7c13656befeba458c87242697fe536dd5854e18158cf92f7678
-
Size
12KB
-
Sample
240523-az6d1sfc38
-
MD5
739eb66186952131480f2c2513e86ad7
-
SHA1
42b107eec47af6069ed5dc3c9c266b32c36fa188
-
SHA256
496a0e268e8fc7c13656befeba458c87242697fe536dd5854e18158cf92f7678
-
SHA512
5912eca67f6ae023693c599924329e240b67cd102d606f19d06a2a8a6493ce0190fba04e192dafc416c350b79d70114ddea931451ebd78c8c35028ee3ed23d68
-
SSDEEP
192:kL29RBzDzeobchBj8JONAONWruxrEPEjr7AhT:q29jnbcvYJOdUuxvr7CT
Static task
static1
Behavioral task
behavioral1
Sample
496a0e268e8fc7c13656befeba458c87242697fe536dd5854e18158cf92f7678.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
496a0e268e8fc7c13656befeba458c87242697fe536dd5854e18158cf92f7678.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
496a0e268e8fc7c13656befeba458c87242697fe536dd5854e18158cf92f7678
-
Size
12KB
-
MD5
739eb66186952131480f2c2513e86ad7
-
SHA1
42b107eec47af6069ed5dc3c9c266b32c36fa188
-
SHA256
496a0e268e8fc7c13656befeba458c87242697fe536dd5854e18158cf92f7678
-
SHA512
5912eca67f6ae023693c599924329e240b67cd102d606f19d06a2a8a6493ce0190fba04e192dafc416c350b79d70114ddea931451ebd78c8c35028ee3ed23d68
-
SSDEEP
192:kL29RBzDzeobchBj8JONAONWruxrEPEjr7AhT:q29jnbcvYJOdUuxvr7CT
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-