General
-
Target
2024-11-18_3f7757693e34a233b5f377cf8232975c_floxif_frostygoop_snatch
-
Size
3.6MB
-
Sample
241118-w3fhnascme
-
MD5
3f7757693e34a233b5f377cf8232975c
-
SHA1
016579ac39084405dd3a7851b5880fa873f4c7fd
-
SHA256
3878fc5b171932a898b8dcfaba77b5ddca36e3163ff62ca4de73a8db0c8eba85
-
SHA512
17e5fd4dfc409a04c90ad53b59cac6dd2dae75f647befbaaa7a0a131aeb9cfa197fb078aa408df3f2e7122ff534ff8ec71d4dd358451d101b03b0b84dea1769b
-
SSDEEP
49152:VRs2n1IKKvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZY:zs2WNyEme4fOTwq2iOLkQmY
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-18_3f7757693e34a233b5f377cf8232975c_floxif_frostygoop_snatch.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-11-18_3f7757693e34a233b5f377cf8232975c_floxif_frostygoop_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-11-18_3f7757693e34a233b5f377cf8232975c_floxif_frostygoop_snatch
-
Size
3.6MB
-
MD5
3f7757693e34a233b5f377cf8232975c
-
SHA1
016579ac39084405dd3a7851b5880fa873f4c7fd
-
SHA256
3878fc5b171932a898b8dcfaba77b5ddca36e3163ff62ca4de73a8db0c8eba85
-
SHA512
17e5fd4dfc409a04c90ad53b59cac6dd2dae75f647befbaaa7a0a131aeb9cfa197fb078aa408df3f2e7122ff534ff8ec71d4dd358451d101b03b0b84dea1769b
-
SSDEEP
49152:VRs2n1IKKvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZY:zs2WNyEme4fOTwq2iOLkQmY
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-