General
-
Target
a4f9bc6d511e630a8629557f5b79ba9cd8fcd23bdc8786ee5ebe15d1f61a40fc
-
Size
1.2MB
-
Sample
241213-xyma3sxnft
-
MD5
c62f172c3b59196d73b8a8ba0be84bfa
-
SHA1
09d83e5578eda48c72cfad84579b9cdb7f09e77b
-
SHA256
a4f9bc6d511e630a8629557f5b79ba9cd8fcd23bdc8786ee5ebe15d1f61a40fc
-
SHA512
819d209841a085db303e4caabe353ce13796a790f4bea8844556a160eeb4740dcb8ed7a0852382e212e56a7388c9ebbecc867789af9e4f3c90d3e908c38c40dc
-
SSDEEP
24576:kIgUH4/nTnej9r2PlwBwd8/JF+cd3Hksx7qJ1j4coCYHb0YL2KGrEH7J:kgc09r2PGB1Hki7qJ1UcophTD
Static task
static1
Behavioral task
behavioral1
Sample
a4f9bc6d511e630a8629557f5b79ba9cd8fcd23bdc8786ee5ebe15d1f61a40fc.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
a4f9bc6d511e630a8629557f5b79ba9cd8fcd23bdc8786ee5ebe15d1f61a40fc
-
Size
1.2MB
-
MD5
c62f172c3b59196d73b8a8ba0be84bfa
-
SHA1
09d83e5578eda48c72cfad84579b9cdb7f09e77b
-
SHA256
a4f9bc6d511e630a8629557f5b79ba9cd8fcd23bdc8786ee5ebe15d1f61a40fc
-
SHA512
819d209841a085db303e4caabe353ce13796a790f4bea8844556a160eeb4740dcb8ed7a0852382e212e56a7388c9ebbecc867789af9e4f3c90d3e908c38c40dc
-
SSDEEP
24576:kIgUH4/nTnej9r2PlwBwd8/JF+cd3Hksx7qJ1j4coCYHb0YL2KGrEH7J:kgc09r2PGB1Hki7qJ1UcophTD
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1