General
-
Target
5c87ed5e33407b2449960e8a82a38670N.exe
-
Size
609KB
-
Sample
240723-d6f99awcpq
-
MD5
5c87ed5e33407b2449960e8a82a38670
-
SHA1
894dde63b59914daf72a3569af24cd38d0d5b28c
-
SHA256
303379a2af1434f73322e504e2f8f16ec509ed75859610f7eee3a67bde8d82e8
-
SHA512
5a9a19c1b726c015e6e9b450c0b96b723128a9281c7707c66ddbfeff679c957c93e833c5fc5efd2046274a1ce136a0a0c0f59e4dea4ffb1a9b0265d6b1289778
-
SSDEEP
12288:0FLUSH5CkcVJh0ux3uqmSbi15kWd7Ko8xyJoVaV4EMD6cwaJQXBjvrEH76:4LUSn60ux37ml15kWd7Ko8xyJoVaV4E9
Static task
static1
Behavioral task
behavioral1
Sample
5c87ed5e33407b2449960e8a82a38670N.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
5c87ed5e33407b2449960e8a82a38670N.exe
-
Size
609KB
-
MD5
5c87ed5e33407b2449960e8a82a38670
-
SHA1
894dde63b59914daf72a3569af24cd38d0d5b28c
-
SHA256
303379a2af1434f73322e504e2f8f16ec509ed75859610f7eee3a67bde8d82e8
-
SHA512
5a9a19c1b726c015e6e9b450c0b96b723128a9281c7707c66ddbfeff679c957c93e833c5fc5efd2046274a1ce136a0a0c0f59e4dea4ffb1a9b0265d6b1289778
-
SSDEEP
12288:0FLUSH5CkcVJh0ux3uqmSbi15kWd7Ko8xyJoVaV4EMD6cwaJQXBjvrEH76:4LUSn60ux37ml15kWd7Ko8xyJoVaV4E9
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-