General
-
Target
84ec6dc1922e958e7093d9a6fa8ddbcb30a09c25b520218d1317dfa338c408e3
-
Size
388KB
-
Sample
240926-hnhskstckm
-
MD5
32a5cdf9b2200f6b85b8fcac739f996d
-
SHA1
6c71269f4e1e7fd1bcdff499437df3ec93357b95
-
SHA256
84ec6dc1922e958e7093d9a6fa8ddbcb30a09c25b520218d1317dfa338c408e3
-
SHA512
85ed7fa2e0148019b12fab0472c4db87f16d94e616c95e19d25504176fb46fad921d78fbae2f1cdb0d6780138089667b0af316fc1914c4935a5a07359e50962c
-
SSDEEP
12288:bo8Le5R2KW20jkjTz9MjzCVXHvLY9OpRRjr9hPoQN9qghiaXwTECmBb0TeLARqkX:pe5R2KW20az9MjzC12OpRR39Z1N9PQa+
Static task
static1
Behavioral task
behavioral1
Sample
84ec6dc1922e958e7093d9a6fa8ddbcb30a09c25b520218d1317dfa338c408e3.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
84ec6dc1922e958e7093d9a6fa8ddbcb30a09c25b520218d1317dfa338c408e3
-
Size
388KB
-
MD5
32a5cdf9b2200f6b85b8fcac739f996d
-
SHA1
6c71269f4e1e7fd1bcdff499437df3ec93357b95
-
SHA256
84ec6dc1922e958e7093d9a6fa8ddbcb30a09c25b520218d1317dfa338c408e3
-
SHA512
85ed7fa2e0148019b12fab0472c4db87f16d94e616c95e19d25504176fb46fad921d78fbae2f1cdb0d6780138089667b0af316fc1914c4935a5a07359e50962c
-
SSDEEP
12288:bo8Le5R2KW20jkjTz9MjzCVXHvLY9OpRRjr9hPoQN9qghiaXwTECmBb0TeLARqkX:pe5R2KW20az9MjzC12OpRR39Z1N9PQa+
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-