General
-
Target
5d6de1e8108ce007421343be249f45badd54eb0fa4ceb3b85ccdfdfa7e8a3475
-
Size
224KB
-
Sample
241118-tey9ravmbn
-
MD5
a8363361d2244981ae25ff15167d82fe
-
SHA1
34b49060c8edecd334f0f8b0273d1f0b01cf6ed5
-
SHA256
5d6de1e8108ce007421343be249f45badd54eb0fa4ceb3b85ccdfdfa7e8a3475
-
SHA512
d249ae507952ae0fddefe038ed367cfe56d04e51e3e806862446d9c13dbf2981d8fc9fd14ca72365f567fd665ff9ab88c5b56ecfb75397450f624a1157c6119a
-
SSDEEP
6144:ay52zi7a2ORcGLKZH2FaLw9hH4JdBV+UdvrEFp7hKxog:ay52zi+2Of9hH4JdBjvrEH7Jg
Static task
static1
Behavioral task
behavioral1
Sample
5d6de1e8108ce007421343be249f45badd54eb0fa4ceb3b85ccdfdfa7e8a3475.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5d6de1e8108ce007421343be249f45badd54eb0fa4ceb3b85ccdfdfa7e8a3475.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5d6de1e8108ce007421343be249f45badd54eb0fa4ceb3b85ccdfdfa7e8a3475
-
Size
224KB
-
MD5
a8363361d2244981ae25ff15167d82fe
-
SHA1
34b49060c8edecd334f0f8b0273d1f0b01cf6ed5
-
SHA256
5d6de1e8108ce007421343be249f45badd54eb0fa4ceb3b85ccdfdfa7e8a3475
-
SHA512
d249ae507952ae0fddefe038ed367cfe56d04e51e3e806862446d9c13dbf2981d8fc9fd14ca72365f567fd665ff9ab88c5b56ecfb75397450f624a1157c6119a
-
SSDEEP
6144:ay52zi7a2ORcGLKZH2FaLw9hH4JdBV+UdvrEFp7hKxog:ay52zi+2Of9hH4JdBjvrEH7Jg
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-