General
-
Target
cfe8488cc50e1e9727bbce2435b568798aaad6430c0547f4662da8a960f854a2
-
Size
2.4MB
-
Sample
241107-fctdtsyjbj
-
MD5
66ed1f251affc78cb4489939a86a547d
-
SHA1
875054ff7afc5ba569f16ea309dedefc1a479b7e
-
SHA256
cfe8488cc50e1e9727bbce2435b568798aaad6430c0547f4662da8a960f854a2
-
SHA512
13cd0110f8fc1003e43ce19918e7332e7da2ce61165e35c849b5c388fd0810a4cc9b5e02543ea2601ee69c86012ec3e4f5fb4b841aeea0de3955d14c0b1dd090
-
SSDEEP
49152:LJmaBskFv25NQJgRmBib5dnnHX/UDU/N47fEU9JsiGKZ1Gwr:LNpvuN6gYMPn3sNH1zGwr
Behavioral task
behavioral1
Sample
cfe8488cc50e1e9727bbce2435b568798aaad6430c0547f4662da8a960f854a2.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
cfe8488cc50e1e9727bbce2435b568798aaad6430c0547f4662da8a960f854a2
-
Size
2.4MB
-
MD5
66ed1f251affc78cb4489939a86a547d
-
SHA1
875054ff7afc5ba569f16ea309dedefc1a479b7e
-
SHA256
cfe8488cc50e1e9727bbce2435b568798aaad6430c0547f4662da8a960f854a2
-
SHA512
13cd0110f8fc1003e43ce19918e7332e7da2ce61165e35c849b5c388fd0810a4cc9b5e02543ea2601ee69c86012ec3e4f5fb4b841aeea0de3955d14c0b1dd090
-
SSDEEP
49152:LJmaBskFv25NQJgRmBib5dnnHX/UDU/N47fEU9JsiGKZ1Gwr:LNpvuN6gYMPn3sNH1zGwr
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-