General
-
Target
eed7a919fc621931f9265613314b1034d1e90f436d5b3311f40c49bd4a426ca0
-
Size
14.4MB
-
Sample
241210-z9fc1svkhr
-
MD5
d1a08db9ef3459f1209770d34ab3ed44
-
SHA1
22e57e43a1cff1ac88bebe508579cfad60466663
-
SHA256
eed7a919fc621931f9265613314b1034d1e90f436d5b3311f40c49bd4a426ca0
-
SHA512
f525f6ba9fd786eecd572ca578ac07ffa6237ef181403edba2b2b997370fc1ecf132aa983b2806c1be257143a4d60cfd62784e7aa645a1bf95c367886d8bde95
-
SSDEEP
393216:XMYURlE9ZfMQ0qpQ4zh9dRInU3uySVrSWz4kwSGZ7ciZZspu5:XMYqiDpQy1sc55
Static task
static1
Behavioral task
behavioral1
Sample
eed7a919fc621931f9265613314b1034d1e90f436d5b3311f40c49bd4a426ca0.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
eed7a919fc621931f9265613314b1034d1e90f436d5b3311f40c49bd4a426ca0
-
Size
14.4MB
-
MD5
d1a08db9ef3459f1209770d34ab3ed44
-
SHA1
22e57e43a1cff1ac88bebe508579cfad60466663
-
SHA256
eed7a919fc621931f9265613314b1034d1e90f436d5b3311f40c49bd4a426ca0
-
SHA512
f525f6ba9fd786eecd572ca578ac07ffa6237ef181403edba2b2b997370fc1ecf132aa983b2806c1be257143a4d60cfd62784e7aa645a1bf95c367886d8bde95
-
SSDEEP
393216:XMYURlE9ZfMQ0qpQ4zh9dRInU3uySVrSWz4kwSGZ7ciZZspu5:XMYqiDpQy1sc55
-
Floxif family
-
Detects Floxif payload
-
Drops file in Drivers directory
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-