General
-
Target
393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056
-
Size
12KB
-
Sample
240523-jvj5naab7z
-
MD5
460bd6d522b0a9a99015e763bff25ab6
-
SHA1
cdaab1bf2071c7e71b2bd3c2a9ca83f94669eb3e
-
SHA256
393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056
-
SHA512
2d9f2b628fcb629b37ffa7fb848f1dfec3baac2a9ed66c4334ac7b9a9a7faf1d8ea813e62ad512340843bb5a815f10879e74522dc8451134c93d9b95b52294bb
-
SSDEEP
192:L9L29RBzDzeobchBj8JONrONdHruYrEPEjr7Ahs:Ll29jnbcvYJOILLuYvr7Cs
Static task
static1
Behavioral task
behavioral1
Sample
393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056.xll
Resource
win11-20240426-en
Malware Config
Extracted
Targets
-
-
Target
393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056
-
Size
12KB
-
MD5
460bd6d522b0a9a99015e763bff25ab6
-
SHA1
cdaab1bf2071c7e71b2bd3c2a9ca83f94669eb3e
-
SHA256
393210ac29ac4e5bba1583dbc831582f3148720daf3db9d04625abf2be4fd056
-
SHA512
2d9f2b628fcb629b37ffa7fb848f1dfec3baac2a9ed66c4334ac7b9a9a7faf1d8ea813e62ad512340843bb5a815f10879e74522dc8451134c93d9b95b52294bb
-
SSDEEP
192:L9L29RBzDzeobchBj8JONrONdHruYrEPEjr7Ahs:Ll29jnbcvYJOILLuYvr7Cs
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-