General
-
Target
0f028fdf08548cb15ed87401d172595a893247957d0e204ae0ca002506898234
-
Size
574KB
-
Sample
241119-nps8lawejl
-
MD5
0f7840337d6a3752a0805ea9cf0fbdb0
-
SHA1
d44758bf46c4ba17b7148b46d08e07aba4347116
-
SHA256
0f028fdf08548cb15ed87401d172595a893247957d0e204ae0ca002506898234
-
SHA512
6f07644648d9a3a107c72d738f3c4f346894bbe58b8d4e72f23f679292555ca60b190e3553a94b4101951ff4fcf69546c339b54b11bb5184a099026400a4f162
-
SSDEEP
12288:uxNv/pAfv888nhJxeRLCsjqDgiTF+3PMCoP56BjvrEH7qC:eBA38NxUCTFGMerEH7T
Behavioral task
behavioral1
Sample
0f028fdf08548cb15ed87401d172595a893247957d0e204ae0ca002506898234.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0f028fdf08548cb15ed87401d172595a893247957d0e204ae0ca002506898234.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0f028fdf08548cb15ed87401d172595a893247957d0e204ae0ca002506898234
-
Size
574KB
-
MD5
0f7840337d6a3752a0805ea9cf0fbdb0
-
SHA1
d44758bf46c4ba17b7148b46d08e07aba4347116
-
SHA256
0f028fdf08548cb15ed87401d172595a893247957d0e204ae0ca002506898234
-
SHA512
6f07644648d9a3a107c72d738f3c4f346894bbe58b8d4e72f23f679292555ca60b190e3553a94b4101951ff4fcf69546c339b54b11bb5184a099026400a4f162
-
SSDEEP
12288:uxNv/pAfv888nhJxeRLCsjqDgiTF+3PMCoP56BjvrEH7qC:eBA38NxUCTFGMerEH7T
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-