General
-
Target
d90c2d956193a5523e325ad570a441d0N.exe
-
Size
2.8MB
-
Sample
240815-ks7zdazarr
-
MD5
d90c2d956193a5523e325ad570a441d0
-
SHA1
0eae632e652fd08fd0bc02bab0e00987920e8ca8
-
SHA256
7efec1970ceae669576737f16284560ae79b468b75f804a66f56eeabd235931b
-
SHA512
ea14fe6240dc37be56d82d010da2f4904deea9e5475d3c307f76a381ce800f12544b19399390ce429831492f7107fa510b0cd4c407c7104986894e2192b7b030
-
SSDEEP
49152:hUyywSWdyafJQFHp0QAKkXWmEPaBR149r8rPAbTrtACXQoon0svI4PREvkDH9Evc:h8wSWcafJa0TKkka9k8robPirxnhNJJR
Static task
static1
Behavioral task
behavioral1
Sample
d90c2d956193a5523e325ad570a441d0N.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
d90c2d956193a5523e325ad570a441d0N.exe
-
Size
2.8MB
-
MD5
d90c2d956193a5523e325ad570a441d0
-
SHA1
0eae632e652fd08fd0bc02bab0e00987920e8ca8
-
SHA256
7efec1970ceae669576737f16284560ae79b468b75f804a66f56eeabd235931b
-
SHA512
ea14fe6240dc37be56d82d010da2f4904deea9e5475d3c307f76a381ce800f12544b19399390ce429831492f7107fa510b0cd4c407c7104986894e2192b7b030
-
SSDEEP
49152:hUyywSWdyafJQFHp0QAKkXWmEPaBR149r8rPAbTrtACXQoon0svI4PREvkDH9Evc:h8wSWcafJa0TKkka9k8robPirxnhNJJR
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-