General
-
Target
b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47dN
-
Size
2.0MB
-
Sample
241004-pmywqstern
-
MD5
97e2e07e1f93bd0f06a54350d2714460
-
SHA1
04e2e77b99841e7a75f6bc689e8868ef7e35fcb6
-
SHA256
b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47d
-
SHA512
a439c3595bae89de8c99b966add104913ccf502733fa3bdb3e03ebb550c21258a7bcb64081d12372f19c063d78e3cc6a51afc33cecd9b6c43d220063647dc3b0
-
SSDEEP
49152:jio6pWgAw3G+ZDYolW9Y3OqkWXNc3lxF9LLPOAtBZ8rIy1cgD5jHmcS:jApWIGOTW9Y3OqkWXNc3lxFTtH8rIy1U
Static task
static1
Behavioral task
behavioral1
Sample
b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47dN.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47dN
-
Size
2.0MB
-
MD5
97e2e07e1f93bd0f06a54350d2714460
-
SHA1
04e2e77b99841e7a75f6bc689e8868ef7e35fcb6
-
SHA256
b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47d
-
SHA512
a439c3595bae89de8c99b966add104913ccf502733fa3bdb3e03ebb550c21258a7bcb64081d12372f19c063d78e3cc6a51afc33cecd9b6c43d220063647dc3b0
-
SSDEEP
49152:jio6pWgAw3G+ZDYolW9Y3OqkWXNc3lxF9LLPOAtBZ8rIy1cgD5jHmcS:jApWIGOTW9Y3OqkWXNc3lxFTtH8rIy1U
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-