General
-
Target
14c07f17a2ff9f6a29c4e3f55e5dc1c27efe5c55b55184045d2dc6da26937283N.exe
-
Size
213KB
-
Sample
241211-qbgczstma1
-
MD5
779ff7e8299c62653afdddeb90d0a300
-
SHA1
9bfd7bc22372f3590a36e9c6422e4585a23c9154
-
SHA256
14c07f17a2ff9f6a29c4e3f55e5dc1c27efe5c55b55184045d2dc6da26937283
-
SHA512
f6b64de8718108c8f63c82df2dfd4d29218ede9e458c9fafbc2c3189f7233277b284738ff1f976a577c50f16700198324b3a7a7ca6085e1eef4b0cae7a2ceaff
-
SSDEEP
6144:aGpSdQ6mCtnRPF9cCGr/uHkBV+UdvrEFp7hKgB:aGpinRNh4uHkBjvrEH7lB
Static task
static1
Behavioral task
behavioral1
Sample
14c07f17a2ff9f6a29c4e3f55e5dc1c27efe5c55b55184045d2dc6da26937283N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
14c07f17a2ff9f6a29c4e3f55e5dc1c27efe5c55b55184045d2dc6da26937283N.exe
-
Size
213KB
-
MD5
779ff7e8299c62653afdddeb90d0a300
-
SHA1
9bfd7bc22372f3590a36e9c6422e4585a23c9154
-
SHA256
14c07f17a2ff9f6a29c4e3f55e5dc1c27efe5c55b55184045d2dc6da26937283
-
SHA512
f6b64de8718108c8f63c82df2dfd4d29218ede9e458c9fafbc2c3189f7233277b284738ff1f976a577c50f16700198324b3a7a7ca6085e1eef4b0cae7a2ceaff
-
SSDEEP
6144:aGpSdQ6mCtnRPF9cCGr/uHkBV+UdvrEFp7hKgB:aGpinRNh4uHkBjvrEH7lB
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-