General
-
Target
a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4
-
Size
12KB
-
Sample
240523-bqbcysge39
-
MD5
ee6c79fd4247c2c265c16985c7459af4
-
SHA1
7899162e9bccb0e16739814da2ad2ebca46a58b9
-
SHA256
a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4
-
SHA512
7d31f5e89e4a3bf9f51f7211f78d0ce07463a68bfc99276be4b99c17ed794726648c2012786fed9900ebc59bad042de8b31fe96645cf143cdaebef6ae84e9fb5
-
SSDEEP
192:pL29RBzDzeobchBj8JONLON3qbruIrEPEjr7Ah83:J29jnbcvYJOEdq3uIvr7C0
Static task
static1
Behavioral task
behavioral1
Sample
a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4
-
Size
12KB
-
MD5
ee6c79fd4247c2c265c16985c7459af4
-
SHA1
7899162e9bccb0e16739814da2ad2ebca46a58b9
-
SHA256
a6052d953f77d1f9412b08434720420e41114419658b267bbb050a0f21a5cec4
-
SHA512
7d31f5e89e4a3bf9f51f7211f78d0ce07463a68bfc99276be4b99c17ed794726648c2012786fed9900ebc59bad042de8b31fe96645cf143cdaebef6ae84e9fb5
-
SSDEEP
192:pL29RBzDzeobchBj8JONLON3qbruIrEPEjr7Ah83:J29jnbcvYJOEdq3uIvr7C0
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-