General
-
Target
f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f
-
Size
286KB
-
Sample
241214-bjpa8ssmgw
-
MD5
ddceefc560566c72532c469711df1a90
-
SHA1
4958dd1cc14e3ecabc489f906a82bffb909817a9
-
SHA256
f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f
-
SHA512
5b9aa27665f7fb15c148ce54c70db22a49c1f572d112b3f67de8ab349c1c2c7c60b610b79847fdf32106502d6b8302bd3ad0d75dc3dcfa59257484652501fd32
-
SSDEEP
6144:e7gLU/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKeU:e7gLU/JuyXnPB+h8WHlBjvrEH77U
Static task
static1
Behavioral task
behavioral1
Sample
f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f
-
Size
286KB
-
MD5
ddceefc560566c72532c469711df1a90
-
SHA1
4958dd1cc14e3ecabc489f906a82bffb909817a9
-
SHA256
f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f
-
SHA512
5b9aa27665f7fb15c148ce54c70db22a49c1f572d112b3f67de8ab349c1c2c7c60b610b79847fdf32106502d6b8302bd3ad0d75dc3dcfa59257484652501fd32
-
SSDEEP
6144:e7gLU/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKeU:e7gLU/JuyXnPB+h8WHlBjvrEH77U
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-