General
-
Target
4d6efe6b8c3b67e6f7758a47f8157779a8b4bffc861ccfe2a54ef4074fad78efN
-
Size
1.9MB
-
Sample
240919-hzmkxawgja
-
MD5
5d07671cdbb4ac7876c2060c8a9d3e50
-
SHA1
e4e5d79a9eecb75f6eb81d9ee1624c51fe304f7c
-
SHA256
4d6efe6b8c3b67e6f7758a47f8157779a8b4bffc861ccfe2a54ef4074fad78ef
-
SHA512
89a55c3a359c4520298bfcaa57f05ff5ffc7535bb3ccc6fe503244e21744de425c120fc101639e96390a881f2d531139b35972f6d225ed22e0554e6be0cfff46
-
SSDEEP
49152:T4ikr/jgjlzorBK/TLuOsQyPkdulQbKAgS/L/CLgHYoo:k3r/ql8g/TLuOsQuYu6bKs/Nw
Static task
static1
Behavioral task
behavioral1
Sample
4d6efe6b8c3b67e6f7758a47f8157779a8b4bffc861ccfe2a54ef4074fad78efN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4d6efe6b8c3b67e6f7758a47f8157779a8b4bffc861ccfe2a54ef4074fad78efN.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
4d6efe6b8c3b67e6f7758a47f8157779a8b4bffc861ccfe2a54ef4074fad78efN
-
Size
1.9MB
-
MD5
5d07671cdbb4ac7876c2060c8a9d3e50
-
SHA1
e4e5d79a9eecb75f6eb81d9ee1624c51fe304f7c
-
SHA256
4d6efe6b8c3b67e6f7758a47f8157779a8b4bffc861ccfe2a54ef4074fad78ef
-
SHA512
89a55c3a359c4520298bfcaa57f05ff5ffc7535bb3ccc6fe503244e21744de425c120fc101639e96390a881f2d531139b35972f6d225ed22e0554e6be0cfff46
-
SSDEEP
49152:T4ikr/jgjlzorBK/TLuOsQyPkdulQbKAgS/L/CLgHYoo:k3r/ql8g/TLuOsQuYu6bKs/Nw
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-