General
-
Target
X.exe
-
Size
1.3MB
-
Sample
241009-kfpbhayhmm
-
MD5
af49cb6451da11d7dfbd743efc55a9c2
-
SHA1
fc13b2dbf3909aa661ee4610e8b27d1f45caa6e3
-
SHA256
40fb52053d61eb3542663031875911f9b5ca81f214b29af0aaf633e928b47449
-
SHA512
ba35465ba79c66f2e9be25d52fe87b0d18a898122aaf3cf488af5778c0845950a7f6d147f96bd77d33497ea1cfa29e3551b9a7ae1c8b8e4c5923c301f22c00a4
-
SSDEEP
24576:Kr/M22rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmirrZTrEH7w:SMzxbUJndWeMln8FrmXmSm5Rt
Behavioral task
behavioral1
Sample
X.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
X.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
X.exe
-
Size
1.3MB
-
MD5
af49cb6451da11d7dfbd743efc55a9c2
-
SHA1
fc13b2dbf3909aa661ee4610e8b27d1f45caa6e3
-
SHA256
40fb52053d61eb3542663031875911f9b5ca81f214b29af0aaf633e928b47449
-
SHA512
ba35465ba79c66f2e9be25d52fe87b0d18a898122aaf3cf488af5778c0845950a7f6d147f96bd77d33497ea1cfa29e3551b9a7ae1c8b8e4c5923c301f22c00a4
-
SSDEEP
24576:Kr/M22rDc30x5tUewSFYndCfeI+GajylnGhj9EirEuaXmSmmirrZTrEH7w:SMzxbUJndWeMln8FrmXmSm5Rt
-
Detects Floxif payload
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1