General
-
Target
ca438c61a05dfd4c490b1ccb466c7bfb3ca759d2f18158bbc23352f81734f304
-
Size
437KB
-
Sample
240926-hnmrjawelf
-
MD5
20f29bdc6cc64d3474eb39d5d8be6cf2
-
SHA1
a2efad6d2ec1ab1bf6f5b59c471be1530aabd1e3
-
SHA256
ca438c61a05dfd4c490b1ccb466c7bfb3ca759d2f18158bbc23352f81734f304
-
SHA512
d5cafd095e76ea102716ceac96efddabb1e272b7c4d4c6a51e95273731bc41b69b67ce9e9676c7ab693fc7c63331acedc01d9ea46039a5de2eeb2be29728e6df
-
SSDEEP
12288:Wd0Yfwf7VSXrwrapLQ81G5FVV9dOuvrkGE1fJjeN1HG5OIk/1vlw/FGOAbqhqfRe:hpkNuG5O7vqZAbIqfRQCNBNJrEH7h
Static task
static1
Behavioral task
behavioral1
Sample
ca438c61a05dfd4c490b1ccb466c7bfb3ca759d2f18158bbc23352f81734f304.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ca438c61a05dfd4c490b1ccb466c7bfb3ca759d2f18158bbc23352f81734f304
-
Size
437KB
-
MD5
20f29bdc6cc64d3474eb39d5d8be6cf2
-
SHA1
a2efad6d2ec1ab1bf6f5b59c471be1530aabd1e3
-
SHA256
ca438c61a05dfd4c490b1ccb466c7bfb3ca759d2f18158bbc23352f81734f304
-
SHA512
d5cafd095e76ea102716ceac96efddabb1e272b7c4d4c6a51e95273731bc41b69b67ce9e9676c7ab693fc7c63331acedc01d9ea46039a5de2eeb2be29728e6df
-
SSDEEP
12288:Wd0Yfwf7VSXrwrapLQ81G5FVV9dOuvrkGE1fJjeN1HG5OIk/1vlw/FGOAbqhqfRe:hpkNuG5O7vqZAbIqfRQCNBNJrEH7h
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-