General
-
Target
2024-06-16_cbadf1fa67531665ff8ec30d17b2e9a2_floxif_snatch
-
Size
13.5MB
-
Sample
240616-s4s9csshrr
-
MD5
cbadf1fa67531665ff8ec30d17b2e9a2
-
SHA1
a8219c7ea06e8391741bfb5148c9d08de02c57fe
-
SHA256
74c7580eccfd028023f8e2c406b87aa8960c15b865a257b2ed8c046b692859b8
-
SHA512
c3c9d1503f88ebadb5c079c6d573be3bb85bc5036f1932fcc54e7365e86e9b6ecdf0e819fd8a6859028167a193009d1a8772b5287e2799b0e0773807dcd73082
-
SSDEEP
196608:twowqvKu2Ug/YCsvoB/398M8ml3lhECNFX6:F1OBnE0Fq
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_cbadf1fa67531665ff8ec30d17b2e9a2_floxif_snatch.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-16_cbadf1fa67531665ff8ec30d17b2e9a2_floxif_snatch.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-16_cbadf1fa67531665ff8ec30d17b2e9a2_floxif_snatch
-
Size
13.5MB
-
MD5
cbadf1fa67531665ff8ec30d17b2e9a2
-
SHA1
a8219c7ea06e8391741bfb5148c9d08de02c57fe
-
SHA256
74c7580eccfd028023f8e2c406b87aa8960c15b865a257b2ed8c046b692859b8
-
SHA512
c3c9d1503f88ebadb5c079c6d573be3bb85bc5036f1932fcc54e7365e86e9b6ecdf0e819fd8a6859028167a193009d1a8772b5287e2799b0e0773807dcd73082
-
SSDEEP
196608:twowqvKu2Ug/YCsvoB/398M8ml3lhECNFX6:F1OBnE0Fq
Score9/10-
UPX dump on OEP (original entry point)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-