General
-
Target
66f01c76e986ce2018b3320662bbc2c3825fc87521302c7408f759cc53ff44daN
-
Size
3.6MB
-
Sample
241109-p2mr1svdjf
-
MD5
461076aa27ac12fe2299510ded143f90
-
SHA1
bd3db936b6ea03dff3836c7d473d2db1908b8cbd
-
SHA256
66f01c76e986ce2018b3320662bbc2c3825fc87521302c7408f759cc53ff44da
-
SHA512
dae12bfa341e77bc1846e29e858f5b3da7a7761595e3666a91948a6cab82f94312a03d1b8db99779d6d0e9d7835f36ad795ee300175ace3e0965ff0a04110179
-
SSDEEP
49152:VRW2s1IKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZh:zW2TpyEme4fOTwq2iOLkQmh
Static task
static1
Behavioral task
behavioral1
Sample
66f01c76e986ce2018b3320662bbc2c3825fc87521302c7408f759cc53ff44daN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
66f01c76e986ce2018b3320662bbc2c3825fc87521302c7408f759cc53ff44daN
-
Size
3.6MB
-
MD5
461076aa27ac12fe2299510ded143f90
-
SHA1
bd3db936b6ea03dff3836c7d473d2db1908b8cbd
-
SHA256
66f01c76e986ce2018b3320662bbc2c3825fc87521302c7408f759cc53ff44da
-
SHA512
dae12bfa341e77bc1846e29e858f5b3da7a7761595e3666a91948a6cab82f94312a03d1b8db99779d6d0e9d7835f36ad795ee300175ace3e0965ff0a04110179
-
SSDEEP
49152:VRW2s1IKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZh:zW2TpyEme4fOTwq2iOLkQmh
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-