General
-
Target
b8b89a9109b7976f75be43bc48babbcfc4b67bb4abcfa5bca9c0fce409c763cf
-
Size
286KB
-
Sample
241213-zsvflszpgr
-
MD5
fa8805bfb9c5cc381ba7de969e9e0d1b
-
SHA1
9f6d25992fff732c7f86d4e624319f0fc5333de2
-
SHA256
b8b89a9109b7976f75be43bc48babbcfc4b67bb4abcfa5bca9c0fce409c763cf
-
SHA512
6a340a03e2e4e4b4015d3dbec7e704d529dcab46972309eb21fc2329dac71aa87fd8d40cfcd2b8373f265e81a7595e5569ddaa9f83c23683ff93c8c158be2d79
-
SSDEEP
6144:x7gKNkhSR/BvuyXnZhB+h8WHxBV+UdvrEFp7hKe:x7gKNkhm/BvuyXnPB+h8WHxBjvrEH7R
Static task
static1
Behavioral task
behavioral1
Sample
b8b89a9109b7976f75be43bc48babbcfc4b67bb4abcfa5bca9c0fce409c763cf.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b8b89a9109b7976f75be43bc48babbcfc4b67bb4abcfa5bca9c0fce409c763cf
-
Size
286KB
-
MD5
fa8805bfb9c5cc381ba7de969e9e0d1b
-
SHA1
9f6d25992fff732c7f86d4e624319f0fc5333de2
-
SHA256
b8b89a9109b7976f75be43bc48babbcfc4b67bb4abcfa5bca9c0fce409c763cf
-
SHA512
6a340a03e2e4e4b4015d3dbec7e704d529dcab46972309eb21fc2329dac71aa87fd8d40cfcd2b8373f265e81a7595e5569ddaa9f83c23683ff93c8c158be2d79
-
SSDEEP
6144:x7gKNkhSR/BvuyXnZhB+h8WHxBV+UdvrEFp7hKe:x7gKNkhm/BvuyXnPB+h8WHxBjvrEH7R
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-