General
-
Target
b6514db605dc94d60ce45ace0f967840N
-
Size
2.0MB
-
Sample
240910-ecw92sxbkf
-
MD5
b6514db605dc94d60ce45ace0f967840
-
SHA1
b4d24745fa05b15b10c6a9e3267a32ab7a46b7b4
-
SHA256
fbf0fd9b7ac07e953ddb73dd913b2c1cef6482ae721177b82e6ef1ef149a91a7
-
SHA512
98c79a2cff2281ce0c4fd923a07ed63dd90daa9d492d76d9a8557f729a1a1ab99bef46cdf3624cc779cce6819294d088a6d4f1678dc6921ceda1a3b278413dc6
-
SSDEEP
49152:jio6pWgAw3G+ZDYolW9Y3OqkWXNc3lKF9LLPO/tBZ8rIy1cgD5jHmTBPJ:jApWIGOTW9Y3OqkWXNc3lKFstH8rIy1c
Static task
static1
Behavioral task
behavioral1
Sample
b6514db605dc94d60ce45ace0f967840N.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
b6514db605dc94d60ce45ace0f967840N
-
Size
2.0MB
-
MD5
b6514db605dc94d60ce45ace0f967840
-
SHA1
b4d24745fa05b15b10c6a9e3267a32ab7a46b7b4
-
SHA256
fbf0fd9b7ac07e953ddb73dd913b2c1cef6482ae721177b82e6ef1ef149a91a7
-
SHA512
98c79a2cff2281ce0c4fd923a07ed63dd90daa9d492d76d9a8557f729a1a1ab99bef46cdf3624cc779cce6819294d088a6d4f1678dc6921ceda1a3b278413dc6
-
SSDEEP
49152:jio6pWgAw3G+ZDYolW9Y3OqkWXNc3lKF9LLPO/tBZ8rIy1cgD5jHmTBPJ:jApWIGOTW9Y3OqkWXNc3lKFstH8rIy1c
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-