General
-
Target
4f35f90d8c38b680e1ac8f43750bc8dc9f9c83e30de385a1452bdd27fee455cf
-
Size
5.2MB
-
Sample
240916-zxzwwszcml
-
MD5
35fbf59cfbe4d6cc849d4c55257d9a0d
-
SHA1
ebba97f0b487491856638b63ee1c0b40fa2c7cdb
-
SHA256
4f35f90d8c38b680e1ac8f43750bc8dc9f9c83e30de385a1452bdd27fee455cf
-
SHA512
9b370b88df825a588aac34344e7ec0456f2c19a85d0b01a477fb01c714158ac77af20143b0a1c19ad17cb82efe557f63975d968b28ac7da5b7e71e262f11ca41
-
SSDEEP
49152:bLfHHDh1RsG+bi9XqX/fErt3bFy1q6PKpzZi3dkY94sDJoV/fseTXmkaGAC0w2gd:bbDh1RfEAtrFy10zs4sDJoV/fT7
Static task
static1
Behavioral task
behavioral1
Sample
4f35f90d8c38b680e1ac8f43750bc8dc9f9c83e30de385a1452bdd27fee455cf.dll
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4f35f90d8c38b680e1ac8f43750bc8dc9f9c83e30de385a1452bdd27fee455cf
-
Size
5.2MB
-
MD5
35fbf59cfbe4d6cc849d4c55257d9a0d
-
SHA1
ebba97f0b487491856638b63ee1c0b40fa2c7cdb
-
SHA256
4f35f90d8c38b680e1ac8f43750bc8dc9f9c83e30de385a1452bdd27fee455cf
-
SHA512
9b370b88df825a588aac34344e7ec0456f2c19a85d0b01a477fb01c714158ac77af20143b0a1c19ad17cb82efe557f63975d968b28ac7da5b7e71e262f11ca41
-
SSDEEP
49152:bLfHHDh1RsG+bi9XqX/fErt3bFy1q6PKpzZi3dkY94sDJoV/fseTXmkaGAC0w2gd:bbDh1RfEAtrFy10zs4sDJoV/fT7
-
Detects Floxif payload
-
Blocklisted process makes network request
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-