General
-
Target
cabe074c49b34398928c55ceab56d4b558e6e47d01e57018df8f4d6bc06bc49aN
-
Size
988KB
-
Sample
241101-wjqjhsvmhl
-
MD5
7bafeed79bd78d2ae2f0c66f8bbbc180
-
SHA1
6d9524219f3d985cc67f129f9dad0604d07f4ddc
-
SHA256
cabe074c49b34398928c55ceab56d4b558e6e47d01e57018df8f4d6bc06bc49a
-
SHA512
bdd4e21188a9c46204e06e8f305df1c21c0316d72d9fa53c308957df212be165d5ccf3136a6d3c4ca3630b4c37f33f199260f9499774e9f473449ba4d7755d08
-
SSDEEP
24576:KL36VBIl7dRmYM2whmmp0CEohfZWtoQHvAYnPs7oIUSrEH7t:KzTRmY2NZjYnPs7oP/
Static task
static1
Behavioral task
behavioral1
Sample
cabe074c49b34398928c55ceab56d4b558e6e47d01e57018df8f4d6bc06bc49aN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cabe074c49b34398928c55ceab56d4b558e6e47d01e57018df8f4d6bc06bc49aN.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cabe074c49b34398928c55ceab56d4b558e6e47d01e57018df8f4d6bc06bc49aN
-
Size
988KB
-
MD5
7bafeed79bd78d2ae2f0c66f8bbbc180
-
SHA1
6d9524219f3d985cc67f129f9dad0604d07f4ddc
-
SHA256
cabe074c49b34398928c55ceab56d4b558e6e47d01e57018df8f4d6bc06bc49a
-
SHA512
bdd4e21188a9c46204e06e8f305df1c21c0316d72d9fa53c308957df212be165d5ccf3136a6d3c4ca3630b4c37f33f199260f9499774e9f473449ba4d7755d08
-
SSDEEP
24576:KL36VBIl7dRmYM2whmmp0CEohfZWtoQHvAYnPs7oIUSrEH7t:KzTRmY2NZjYnPs7oP/
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-