General
-
Target
2024-11-18_d33f5a01cbb373dd724f8f4bff18d622_floxif_frostygoop_poet-rat_snatch_zxxz
-
Size
21.1MB
-
Sample
241118-hpz39a1dpa
-
MD5
d33f5a01cbb373dd724f8f4bff18d622
-
SHA1
0b438f701a463a01e05158cc7d1c16446de26027
-
SHA256
5c153e6f451c8dd8c817c67c3d5194e6ffa1d784adc4daa7636a8aefa848e5a6
-
SHA512
680dd588d0e7153349d856d7b97dd5c5fe33c54f6f51344ec19af63e8162c7a1d1116ed560ada3f46f07bf3b914775a0f632d213dc8d13835f08ecdc40a4da04
-
SSDEEP
196608:FlabBX1CVzx5vMvKr6yeN08ePJoJTtIREju+QdDF:HB2GI5IYIdJ
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-18_d33f5a01cbb373dd724f8f4bff18d622_floxif_frostygoop_poet-rat_snatch_zxxz.exe
Resource
win7-20240903-en
Malware Config
Extracted
lumma
https://drawwyobstacw.sbs
https://condifendteu.sbs
https://ehticsprocw.sbs
https://vennurviot.sbs
https://resinedyw.sbs
https://enlargkiw.sbs
https://allocatinow.sbs
https://mathcucom.sbs
https://fevertalkkywkwm.shop/api
Extracted
lumma
https://fevertalkkywkwm.shop/api
Targets
-
-
Target
2024-11-18_d33f5a01cbb373dd724f8f4bff18d622_floxif_frostygoop_poet-rat_snatch_zxxz
-
Size
21.1MB
-
MD5
d33f5a01cbb373dd724f8f4bff18d622
-
SHA1
0b438f701a463a01e05158cc7d1c16446de26027
-
SHA256
5c153e6f451c8dd8c817c67c3d5194e6ffa1d784adc4daa7636a8aefa848e5a6
-
SHA512
680dd588d0e7153349d856d7b97dd5c5fe33c54f6f51344ec19af63e8162c7a1d1116ed560ada3f46f07bf3b914775a0f632d213dc8d13835f08ecdc40a4da04
-
SSDEEP
196608:FlabBX1CVzx5vMvKr6yeN08ePJoJTtIREju+QdDF:HB2GI5IYIdJ
-
Floxif family
-
Lumma family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-