General
-
Target
36d52506e4c45ce1ce036cecb80a2ba0N
-
Size
150KB
-
Sample
240909-jynbgs1cqh
-
MD5
36d52506e4c45ce1ce036cecb80a2ba0
-
SHA1
cbf0902a4377d8484064d5f0fa25c1c5e3ebaacb
-
SHA256
fcee2d231a0bca641db878606feec42fdd88d181de4900f0fc67aa172da0fe77
-
SHA512
91f08c3d233039503a5230775e8cb5bc5af3227b4f78e95572f72728d6cbac3946fcbbfac15ccff9a32032721e0913428de438884f38faa5f16c41198f87b367
-
SSDEEP
3072:KHHZMRNjKvncOiz5ecbCKnN22lQBV+UdE+rECWp7hKts8M:TWvnjIecbC7BV+UdvrEFp7hKyh
Static task
static1
Behavioral task
behavioral1
Sample
36d52506e4c45ce1ce036cecb80a2ba0N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36d52506e4c45ce1ce036cecb80a2ba0N.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
36d52506e4c45ce1ce036cecb80a2ba0N
-
Size
150KB
-
MD5
36d52506e4c45ce1ce036cecb80a2ba0
-
SHA1
cbf0902a4377d8484064d5f0fa25c1c5e3ebaacb
-
SHA256
fcee2d231a0bca641db878606feec42fdd88d181de4900f0fc67aa172da0fe77
-
SHA512
91f08c3d233039503a5230775e8cb5bc5af3227b4f78e95572f72728d6cbac3946fcbbfac15ccff9a32032721e0913428de438884f38faa5f16c41198f87b367
-
SSDEEP
3072:KHHZMRNjKvncOiz5ecbCKnN22lQBV+UdE+rECWp7hKts8M:TWvnjIecbC7BV+UdvrEFp7hKyh
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-