General
-
Target
2024-11-21_0b6d9b9cf86cfd0669374d2b0c4c8893_floxif_frostygoop_hijackloader_poet-rat_snatch_zxxz
-
Size
17.9MB
-
Sample
241121-rrbywatbpn
-
MD5
0b6d9b9cf86cfd0669374d2b0c4c8893
-
SHA1
eeda4797696584077dfec83a6f12e229068b31c5
-
SHA256
c70aa5b3e9fe44fec1305b7ac25f33ee9cc1e52a3c4c54e1611f325f4f005d7f
-
SHA512
17cecd4090f2e79149371f51bdb9b1ca95477a1d4a9cdfbfa2fb1ead467d755e18e15d4395df3d4cab2f3c270916661a95e752f1472020dd05c465536e1a9e5f
-
SSDEEP
98304:FMWhYnBg1d4oUyi2D5jyW/bxkHWvlS0mTK8/WNMtz9f/BILO9qT798Oit/bkR9vs:OWGJ814NjONUWeiHit/bcVsuBg07pbA9
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_0b6d9b9cf86cfd0669374d2b0c4c8893_floxif_frostygoop_hijackloader_poet-rat_snatch_zxxz.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-11-21_0b6d9b9cf86cfd0669374d2b0c4c8893_floxif_frostygoop_hijackloader_poet-rat_snatch_zxxz
-
Size
17.9MB
-
MD5
0b6d9b9cf86cfd0669374d2b0c4c8893
-
SHA1
eeda4797696584077dfec83a6f12e229068b31c5
-
SHA256
c70aa5b3e9fe44fec1305b7ac25f33ee9cc1e52a3c4c54e1611f325f4f005d7f
-
SHA512
17cecd4090f2e79149371f51bdb9b1ca95477a1d4a9cdfbfa2fb1ead467d755e18e15d4395df3d4cab2f3c270916661a95e752f1472020dd05c465536e1a9e5f
-
SSDEEP
98304:FMWhYnBg1d4oUyi2D5jyW/bxkHWvlS0mTK8/WNMtz9f/BILO9qT798Oit/bkR9vs:OWGJ814NjONUWeiHit/bcVsuBg07pbA9
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-