General
-
Target
09ffbeecf61eaa93ab37833f6b1c0430N.exe
-
Size
209KB
-
Sample
240708-1pcxtsshng
-
MD5
09ffbeecf61eaa93ab37833f6b1c0430
-
SHA1
0522e0556207422e8aea0ef9b2a2e1f1bda64bfb
-
SHA256
866bdba016657801637c10e53724538d4b9d2cb86429d1e82a8451312ea51250
-
SHA512
79e4f07fe2471564893b209ba9661d3c661269cf7b9a65f4a015dbe51bdea478c20394943c3a91bdbffdfedd94b27acdc6c5daaab145da3cf5d2e1dc91b90a25
-
SSDEEP
3072:CZx8gJscD1UnU+JZoutueXlCJQ33f8PfJA+R4NvVwFmrtBj7:w2As81UnUEoSZnU3JAEwVwUrTn
Behavioral task
behavioral1
Sample
09ffbeecf61eaa93ab37833f6b1c0430N.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
09ffbeecf61eaa93ab37833f6b1c0430N.exe
-
Size
209KB
-
MD5
09ffbeecf61eaa93ab37833f6b1c0430
-
SHA1
0522e0556207422e8aea0ef9b2a2e1f1bda64bfb
-
SHA256
866bdba016657801637c10e53724538d4b9d2cb86429d1e82a8451312ea51250
-
SHA512
79e4f07fe2471564893b209ba9661d3c661269cf7b9a65f4a015dbe51bdea478c20394943c3a91bdbffdfedd94b27acdc6c5daaab145da3cf5d2e1dc91b90a25
-
SSDEEP
3072:CZx8gJscD1UnU+JZoutueXlCJQ33f8PfJA+R4NvVwFmrtBj7:w2As81UnUEoSZnU3JAEwVwUrTn
-
Detects Floxif payload
-
Drops file in Drivers directory
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1