General
-
Target
a6299240d8817978bde5a2985ee040734e4c8fc62f32a241481ab6dd1db604afN.exe
-
Size
5.8MB
-
Sample
241216-14nmwa1qat
-
MD5
d32fed1e0d722c0981f748c89aa9e2d0
-
SHA1
3a500c6c28aea14da842d46dc0cf98193adf6afd
-
SHA256
a6299240d8817978bde5a2985ee040734e4c8fc62f32a241481ab6dd1db604af
-
SHA512
53809a5bf042378685b63c675a40d86caebfe2ac928e888b06f6922d8a6fcd823c41264843085c12213a0fd31865f163273b53b4f2261f5b4334cd8a45482284
-
SSDEEP
98304:NZAmLhPQYb9QORwlpvKjq6P4YqN18frP3wbzWFimaI7dlo8t:N/LhPQYRQmwlNQNgbzWFimaI7dlR
Static task
static1
Behavioral task
behavioral1
Sample
a6299240d8817978bde5a2985ee040734e4c8fc62f32a241481ab6dd1db604afN.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
a6299240d8817978bde5a2985ee040734e4c8fc62f32a241481ab6dd1db604afN.exe
-
Size
5.8MB
-
MD5
d32fed1e0d722c0981f748c89aa9e2d0
-
SHA1
3a500c6c28aea14da842d46dc0cf98193adf6afd
-
SHA256
a6299240d8817978bde5a2985ee040734e4c8fc62f32a241481ab6dd1db604af
-
SHA512
53809a5bf042378685b63c675a40d86caebfe2ac928e888b06f6922d8a6fcd823c41264843085c12213a0fd31865f163273b53b4f2261f5b4334cd8a45482284
-
SSDEEP
98304:NZAmLhPQYb9QORwlpvKjq6P4YqN18frP3wbzWFimaI7dlo8t:N/LhPQYRQmwlNQNgbzWFimaI7dlR
-
Floxif family
-
Detects Floxif payload
-
A potential corporate email address has been identified in the URL: [email protected]
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1