General
-
Target
2024-12-10_1e809237defdf38ae602a442fe69a259_floxif_magniber
-
Size
11.9MB
-
Sample
241210-bvbvaaymax
-
MD5
1e809237defdf38ae602a442fe69a259
-
SHA1
2c3ff556bf3319713635611c966097a05b109bf0
-
SHA256
d2a60566411dd67d818d529ff1845cc0334e17f06f29a91d114e201dc70f7985
-
SHA512
fcd2bc610d494bf91dc46c78667331c7aa3534b3a256baa705a5df197bd24d0c674f9c617241c03fc649e830516831128a7f9357d96bdfd73ff3a8ade7d08b11
-
SSDEEP
196608:7+XXXaRbXeZ0f1vwnFzOSoQ33snJuokGef6b:7+6RbuqtvwnFWDb
Behavioral task
behavioral1
Sample
2024-12-10_1e809237defdf38ae602a442fe69a259_floxif_magniber.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-10_1e809237defdf38ae602a442fe69a259_floxif_magniber
-
Size
11.9MB
-
MD5
1e809237defdf38ae602a442fe69a259
-
SHA1
2c3ff556bf3319713635611c966097a05b109bf0
-
SHA256
d2a60566411dd67d818d529ff1845cc0334e17f06f29a91d114e201dc70f7985
-
SHA512
fcd2bc610d494bf91dc46c78667331c7aa3534b3a256baa705a5df197bd24d0c674f9c617241c03fc649e830516831128a7f9357d96bdfd73ff3a8ade7d08b11
-
SSDEEP
196608:7+XXXaRbXeZ0f1vwnFzOSoQ33snJuokGef6b:7+6RbuqtvwnFWDb
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-