General
-
Target
2024-12-11_6627588e4275ec88f84fc6f39d201837_floxif_magniber
-
Size
11.9MB
-
Sample
241211-bvf41aypft
-
MD5
6627588e4275ec88f84fc6f39d201837
-
SHA1
6e3d1b89ed58efbfeec2407c2edd5e9f6f6cf7cb
-
SHA256
258e965bbae7a02316d79323e6f955c8dd772fca70c68cde6b8c4e56f17ae5fe
-
SHA512
a0b61b6f4ae55b19e2d92c2091bdfb088ae3dcaf1be362722f2605a1f5b75e6b488f1e1391cca933059f109ededaaaf3ec4a3361bdcf4528529e20abf51ef5d1
-
SSDEEP
196608:I+XXXaRbXeZ0f1vwnFzOSoQ33snJuokGef6z:I+6RbuqtvwnFWDz
Behavioral task
behavioral1
Sample
2024-12-11_6627588e4275ec88f84fc6f39d201837_floxif_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-11_6627588e4275ec88f84fc6f39d201837_floxif_magniber.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-11_6627588e4275ec88f84fc6f39d201837_floxif_magniber
-
Size
11.9MB
-
MD5
6627588e4275ec88f84fc6f39d201837
-
SHA1
6e3d1b89ed58efbfeec2407c2edd5e9f6f6cf7cb
-
SHA256
258e965bbae7a02316d79323e6f955c8dd772fca70c68cde6b8c4e56f17ae5fe
-
SHA512
a0b61b6f4ae55b19e2d92c2091bdfb088ae3dcaf1be362722f2605a1f5b75e6b488f1e1391cca933059f109ededaaaf3ec4a3361bdcf4528529e20abf51ef5d1
-
SSDEEP
196608:I+XXXaRbXeZ0f1vwnFzOSoQ33snJuokGef6z:I+6RbuqtvwnFWDz
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-