General
-
Target
46a0d18c194bef6f8e2f34da17c413205a88b8d104ae3bb9b33981b9ee482984
-
Size
554KB
-
Sample
241119-xmx87szmhx
-
MD5
74b14cb2600f59cd67409e131da48fc9
-
SHA1
aecb9f6a9fe90907b6486b127b21c54438878227
-
SHA256
46a0d18c194bef6f8e2f34da17c413205a88b8d104ae3bb9b33981b9ee482984
-
SHA512
39c6565cc32a111ec2e360c29b3e64d12d22a4445b133ad0bc9e2590a96c750bcdc0b7a3d75c7f3a9f4cab5d1500abe60bad2e7ca87e6b920fbcab1a45b4a0a9
-
SSDEEP
12288:KN58fsMMSsMMfBvMcsCMcs/zFSaUFRFmALnqetG4cR1Mq5JIPBjvrEH7N:K/8fsMMSsMMfBvMcsCMcs/rUFRF3rtjC
Static task
static1
Behavioral task
behavioral1
Sample
46a0d18c194bef6f8e2f34da17c413205a88b8d104ae3bb9b33981b9ee482984.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
46a0d18c194bef6f8e2f34da17c413205a88b8d104ae3bb9b33981b9ee482984.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
46a0d18c194bef6f8e2f34da17c413205a88b8d104ae3bb9b33981b9ee482984
-
Size
554KB
-
MD5
74b14cb2600f59cd67409e131da48fc9
-
SHA1
aecb9f6a9fe90907b6486b127b21c54438878227
-
SHA256
46a0d18c194bef6f8e2f34da17c413205a88b8d104ae3bb9b33981b9ee482984
-
SHA512
39c6565cc32a111ec2e360c29b3e64d12d22a4445b133ad0bc9e2590a96c750bcdc0b7a3d75c7f3a9f4cab5d1500abe60bad2e7ca87e6b920fbcab1a45b4a0a9
-
SSDEEP
12288:KN58fsMMSsMMfBvMcsCMcs/zFSaUFRFmALnqetG4cR1Mq5JIPBjvrEH7N:K/8fsMMSsMMfBvMcsCMcs/rUFRF3rtjC
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-