General
-
Target
73bcc9cbd10402673d7989b549e2fc568cd3896589312608aba9f6fc88df314d
-
Size
584KB
-
Sample
241120-aepwjawbnd
-
MD5
1ca56ad7451356b5b4d257c4b16442ac
-
SHA1
c00c5a174377a2ee484a056e3e05ec9198ce06cf
-
SHA256
73bcc9cbd10402673d7989b549e2fc568cd3896589312608aba9f6fc88df314d
-
SHA512
e49d2977c242c4afbab2f4a875be2d6581f464c69d9d0196139cedd636a38a99f6ea86dc94e215448c33c046b122928104f2866dfb866421f5f66236cb952107
-
SSDEEP
6144:bGU+mU5687CRFGCigrmOgiAu1EqXi8wHczflw+6Z4PV1vIZUP/KEEkBV+UdvrEFe:SU+mAjaGhgQu1XpzOV4PVpBjvrEH7o
Static task
static1
Behavioral task
behavioral1
Sample
73bcc9cbd10402673d7989b549e2fc568cd3896589312608aba9f6fc88df314d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
73bcc9cbd10402673d7989b549e2fc568cd3896589312608aba9f6fc88df314d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
73bcc9cbd10402673d7989b549e2fc568cd3896589312608aba9f6fc88df314d
-
Size
584KB
-
MD5
1ca56ad7451356b5b4d257c4b16442ac
-
SHA1
c00c5a174377a2ee484a056e3e05ec9198ce06cf
-
SHA256
73bcc9cbd10402673d7989b549e2fc568cd3896589312608aba9f6fc88df314d
-
SHA512
e49d2977c242c4afbab2f4a875be2d6581f464c69d9d0196139cedd636a38a99f6ea86dc94e215448c33c046b122928104f2866dfb866421f5f66236cb952107
-
SSDEEP
6144:bGU+mU5687CRFGCigrmOgiAu1EqXi8wHczflw+6Z4PV1vIZUP/KEEkBV+UdvrEFe:SU+mAjaGhgQu1XpzOV4PVpBjvrEH7o
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-