General
-
Target
c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50
-
Size
12KB
-
Sample
240523-bkehesga3z
-
MD5
473c43bf1623b8e7ba5d8098b34043cf
-
SHA1
fc6b68315f59cdd381b1e699392e3fc4648f267b
-
SHA256
c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50
-
SHA512
30c06cc555bf97045755cd7e0ef94a971483bcb9ad2dc5460aa88462ad23442c165c32462bd4c1a52ce9f7a46375ab460151cc66792e5bf6cb3a389c9cac59ca
-
SSDEEP
192:vL29RBzDzeobchBj8JONKONozbru1rEPEjr7Ah5:D29jnbcvYJO/su1vr7C5
Static task
static1
Behavioral task
behavioral1
Sample
c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50.xll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50
-
Size
12KB
-
MD5
473c43bf1623b8e7ba5d8098b34043cf
-
SHA1
fc6b68315f59cdd381b1e699392e3fc4648f267b
-
SHA256
c54609d452e13885cd287ec0b801d8ad5df425cb459176c120fb63c7f5e34d50
-
SHA512
30c06cc555bf97045755cd7e0ef94a971483bcb9ad2dc5460aa88462ad23442c165c32462bd4c1a52ce9f7a46375ab460151cc66792e5bf6cb3a389c9cac59ca
-
SSDEEP
192:vL29RBzDzeobchBj8JONKONozbru1rEPEjr7Ah5:D29jnbcvYJO/su1vr7C5
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-