General
-
Target
88434ff25ebd4e088dd3e007a10ca2e6e5abf7d8c135bacf9f10ef59a30b4b4e
-
Size
133KB
-
Sample
240805-3r21vawejf
-
MD5
5bad0fda806261be385c90f59044431a
-
SHA1
6e3b4d721113c32c3d496f4c684a8ca516c18172
-
SHA256
88434ff25ebd4e088dd3e007a10ca2e6e5abf7d8c135bacf9f10ef59a30b4b4e
-
SHA512
b184e567726f9b861d771db7e01214f2644114228f1c9eddfb9143c606bac2ab31a112f9c2b4b5c3b33bb57931893040e09470f7a9876b870ef482820f968217
-
SSDEEP
3072:RgTa/3/cx2+52lQBV+UdE+rECWp7hKzSFsCP:yTuwBV+UdvrEFp7hKz/CP
Static task
static1
Behavioral task
behavioral1
Sample
88434ff25ebd4e088dd3e007a10ca2e6e5abf7d8c135bacf9f10ef59a30b4b4e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
88434ff25ebd4e088dd3e007a10ca2e6e5abf7d8c135bacf9f10ef59a30b4b4e.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
88434ff25ebd4e088dd3e007a10ca2e6e5abf7d8c135bacf9f10ef59a30b4b4e
-
Size
133KB
-
MD5
5bad0fda806261be385c90f59044431a
-
SHA1
6e3b4d721113c32c3d496f4c684a8ca516c18172
-
SHA256
88434ff25ebd4e088dd3e007a10ca2e6e5abf7d8c135bacf9f10ef59a30b4b4e
-
SHA512
b184e567726f9b861d771db7e01214f2644114228f1c9eddfb9143c606bac2ab31a112f9c2b4b5c3b33bb57931893040e09470f7a9876b870ef482820f968217
-
SSDEEP
3072:RgTa/3/cx2+52lQBV+UdE+rECWp7hKzSFsCP:yTuwBV+UdvrEFp7hKz/CP
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-