General
-
Target
7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128
-
Size
12KB
-
Sample
240523-bkjr5sgc47
-
MD5
856e43d0c930bbf9235d3bebaae2e8f3
-
SHA1
93264d897109839945d6c0d0f71dfcb5cc0eeb6a
-
SHA256
7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128
-
SHA512
d1b40ade8a6d61fc9f57928aabbe9f1109104bc49fcfcbf288432a977825e183b05ed87f5d455a05df3bcf431c651470a28d344bf2ac24a4fc7da14a733d3037
-
SSDEEP
192:IL29RBzDzeobchBj8JONoONA+wruGrEPEjr7AhL:G29jnbcvYJOFeuGvr7CL
Static task
static1
Behavioral task
behavioral1
Sample
7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128.xll
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128
-
Size
12KB
-
MD5
856e43d0c930bbf9235d3bebaae2e8f3
-
SHA1
93264d897109839945d6c0d0f71dfcb5cc0eeb6a
-
SHA256
7d7063368ac5a8686c28396b4684e0e5ed18c24b6d3e7bc74bad196f2f3d6128
-
SHA512
d1b40ade8a6d61fc9f57928aabbe9f1109104bc49fcfcbf288432a977825e183b05ed87f5d455a05df3bcf431c651470a28d344bf2ac24a4fc7da14a733d3037
-
SSDEEP
192:IL29RBzDzeobchBj8JONoONA+wruGrEPEjr7AhL:G29jnbcvYJOFeuGvr7CL
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-