General
-
Target
b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec
-
Size
2.7MB
-
Sample
241119-wwlq4azbnc
-
MD5
814b6ea832d866cc73f6eac4beea5ce2
-
SHA1
f150c9b039752b59da7fc344f5031ac9c530fdd8
-
SHA256
b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec
-
SHA512
49224842515e4a02db6560dab38c866f56cb3b3e378a3dc34d6715f7c02c7259f9bf91ce4109fe20d9a0f10efe814b8d6e260837eb04c8c84857b53a06d43e34
-
SSDEEP
49152:/FJi+7OytIt34Ehz1XdggLOkJAwYzlbFky7CYVmyoZEhaTnMtSYXkNg1:/FJi+ayqVdggLBAjln7CymyougMdn
Static task
static1
Behavioral task
behavioral1
Sample
b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec
-
Size
2.7MB
-
MD5
814b6ea832d866cc73f6eac4beea5ce2
-
SHA1
f150c9b039752b59da7fc344f5031ac9c530fdd8
-
SHA256
b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec
-
SHA512
49224842515e4a02db6560dab38c866f56cb3b3e378a3dc34d6715f7c02c7259f9bf91ce4109fe20d9a0f10efe814b8d6e260837eb04c8c84857b53a06d43e34
-
SSDEEP
49152:/FJi+7OytIt34Ehz1XdggLOkJAwYzlbFky7CYVmyoZEhaTnMtSYXkNg1:/FJi+ayqVdggLBAjln7CymyougMdn
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-