General
-
Target
1fbb80c198c6d2c9cceec18c004269747e54e71e5798902950476a82df833541
-
Size
3.6MB
-
Sample
241119-ywswhswphr
-
MD5
b60fc83e855c465fab0aa1e76912e54d
-
SHA1
cb75288fddb2442c51ccbbf1ac6fab26be494b22
-
SHA256
1fbb80c198c6d2c9cceec18c004269747e54e71e5798902950476a82df833541
-
SHA512
dab09ac07832bc93fd9724ac296c1b0b745b5e34c4c23535691d82cedca676b8c27a83aead724b2b32b89d2ea78c6790d6a16ac2c1f62796e11f16043990f57f
-
SSDEEP
49152:VRh2C1IKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZX:zh25pyEme4fOTwq2iOLkQmX
Static task
static1
Behavioral task
behavioral1
Sample
1fbb80c198c6d2c9cceec18c004269747e54e71e5798902950476a82df833541.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1fbb80c198c6d2c9cceec18c004269747e54e71e5798902950476a82df833541.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1fbb80c198c6d2c9cceec18c004269747e54e71e5798902950476a82df833541
-
Size
3.6MB
-
MD5
b60fc83e855c465fab0aa1e76912e54d
-
SHA1
cb75288fddb2442c51ccbbf1ac6fab26be494b22
-
SHA256
1fbb80c198c6d2c9cceec18c004269747e54e71e5798902950476a82df833541
-
SHA512
dab09ac07832bc93fd9724ac296c1b0b745b5e34c4c23535691d82cedca676b8c27a83aead724b2b32b89d2ea78c6790d6a16ac2c1f62796e11f16043990f57f
-
SSDEEP
49152:VRh2C1IKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZX:zh25pyEme4fOTwq2iOLkQmX
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-