General
-
Target
9fbd4c799eff57fa744ca341a5d930bc41a32b35fd5a03eb802e5c556006fb2cN
-
Size
558KB
-
Sample
241005-n9axraxdjg
-
MD5
11af86bfe08da696898f2ac4909337c0
-
SHA1
5d55188a73bdd9e2090a917c68be69e2e4033935
-
SHA256
9fbd4c799eff57fa744ca341a5d930bc41a32b35fd5a03eb802e5c556006fb2c
-
SHA512
b06712087203e7dba0c23d86006e4064eada85648bbd667a1f0fe4ff912c5d3abe185d10358cd2fcc643afcaf4c07c750f1e4b92f6b33eb7979fec8e4331b74d
-
SSDEEP
6144:DgRzmsiuvAJ+tTm6cyERSiytj71c4E4lKS6v3sQvMRlkM4RD/qzMfUz:DxCvAJ+q6ctRt6364flOBMRGM4h/qofG
Static task
static1
Behavioral task
behavioral1
Sample
9fbd4c799eff57fa744ca341a5d930bc41a32b35fd5a03eb802e5c556006fb2cN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
9fbd4c799eff57fa744ca341a5d930bc41a32b35fd5a03eb802e5c556006fb2cN
-
Size
558KB
-
MD5
11af86bfe08da696898f2ac4909337c0
-
SHA1
5d55188a73bdd9e2090a917c68be69e2e4033935
-
SHA256
9fbd4c799eff57fa744ca341a5d930bc41a32b35fd5a03eb802e5c556006fb2c
-
SHA512
b06712087203e7dba0c23d86006e4064eada85648bbd667a1f0fe4ff912c5d3abe185d10358cd2fcc643afcaf4c07c750f1e4b92f6b33eb7979fec8e4331b74d
-
SSDEEP
6144:DgRzmsiuvAJ+tTm6cyERSiytj71c4E4lKS6v3sQvMRlkM4RD/qzMfUz:DxCvAJ+q6ctRt6364flOBMRGM4h/qofG
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1