General

  • Target

    2024-06-18_e5bc5d9b1d93bd8fe294842aa00c5e53_floxif_mafia

  • Size

    2.6MB

  • Sample

    240618-nwtgyasare

  • MD5

    e5bc5d9b1d93bd8fe294842aa00c5e53

  • SHA1

    cd42fd56f276d2d08c5afdbcc0ae1e02ece2dae3

  • SHA256

    50347e3b1fcf98c121619c222cf55a54414f097c9ecc091ab3a1883bb3d4012c

  • SHA512

    7c580bb2b361fb5674b40fba4bf07246a056ba8d193fa1336a8c3de8288df9ddabf892a3dff7e0d315dcd698ffea8f0c607ccd87176a1e8b9a0c90d48fa791a4

  • SSDEEP

    49152:Kw6c5LN7VSjOmZ1viy920yqWlPlF3RyU9nxvG3bXff9YFiEd2IRm0Smz4hJGh:Yc5LN7CHZAy92iWlPlF3RyU9nhGTfsfL

Malware Config

Targets

    • Target

      2024-06-18_e5bc5d9b1d93bd8fe294842aa00c5e53_floxif_mafia

    • Size

      2.6MB

    • MD5

      e5bc5d9b1d93bd8fe294842aa00c5e53

    • SHA1

      cd42fd56f276d2d08c5afdbcc0ae1e02ece2dae3

    • SHA256

      50347e3b1fcf98c121619c222cf55a54414f097c9ecc091ab3a1883bb3d4012c

    • SHA512

      7c580bb2b361fb5674b40fba4bf07246a056ba8d193fa1336a8c3de8288df9ddabf892a3dff7e0d315dcd698ffea8f0c607ccd87176a1e8b9a0c90d48fa791a4

    • SSDEEP

      49152:Kw6c5LN7VSjOmZ1viy920yqWlPlF3RyU9nxvG3bXff9YFiEd2IRm0Smz4hJGh:Yc5LN7CHZAy92iWlPlF3RyU9nhGTfsfL

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Privilege Escalation

Event Triggered Execution

1
T1546

AppInit DLLs

1
T1546.010

Tasks