General
-
Target
2024-12-14_a12de7296f065a5c023cdd478aafa6c1_floxif_frostygoop_snatch
-
Size
3.6MB
-
Sample
241214-rta5csvmcs
-
MD5
a12de7296f065a5c023cdd478aafa6c1
-
SHA1
f0d01e116da27da69f000c16673ae56a5f457a40
-
SHA256
7356cbb84359273f4c497ae6f613ce716ca83e0b38283b90e2d965b412a1c1e7
-
SHA512
820f6e2125f29a760579179317b22bde57108ae5a81287c4df355b3fbb8fac34196af52c87a004aab445fe10a1c53268c02d41055417023999f96ad7aefd60b8
-
SSDEEP
49152:VRs201IKsvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZE:zs2rHyEme4fOTwq2iOLkQmE
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-14_a12de7296f065a5c023cdd478aafa6c1_floxif_frostygoop_snatch.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2024-12-14_a12de7296f065a5c023cdd478aafa6c1_floxif_frostygoop_snatch
-
Size
3.6MB
-
MD5
a12de7296f065a5c023cdd478aafa6c1
-
SHA1
f0d01e116da27da69f000c16673ae56a5f457a40
-
SHA256
7356cbb84359273f4c497ae6f613ce716ca83e0b38283b90e2d965b412a1c1e7
-
SHA512
820f6e2125f29a760579179317b22bde57108ae5a81287c4df355b3fbb8fac34196af52c87a004aab445fe10a1c53268c02d41055417023999f96ad7aefd60b8
-
SSDEEP
49152:VRs201IKsvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZE:zs2rHyEme4fOTwq2iOLkQmE
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-