General
-
Target
aab513d16f0e41a492b3054d1bf0e2f63980c8ecbeaf401f88631f771f169f93N.exe
-
Size
1.8MB
-
Sample
241216-3gvh1stke1
-
MD5
d72549ff536b06e99c2f86274b79f830
-
SHA1
00822a589f22f9d72a9057a4c697273b7370eb58
-
SHA256
aab513d16f0e41a492b3054d1bf0e2f63980c8ecbeaf401f88631f771f169f93
-
SHA512
8a79ecfdedcf514af38e35491b5061523eb0fa473ad7eb920084d360fb76bc802775fcf4af42e49ca60b7c8e9772c34246272591830a65189ac0b6d35e1c74c0
-
SSDEEP
49152:uhua8pMpRzsOV9bzmkSMDgOPIOY9ayVyPxCr5G:uhudpWHyX9G
Static task
static1
Behavioral task
behavioral1
Sample
aab513d16f0e41a492b3054d1bf0e2f63980c8ecbeaf401f88631f771f169f93N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aab513d16f0e41a492b3054d1bf0e2f63980c8ecbeaf401f88631f771f169f93N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
aab513d16f0e41a492b3054d1bf0e2f63980c8ecbeaf401f88631f771f169f93N.exe
-
Size
1.8MB
-
MD5
d72549ff536b06e99c2f86274b79f830
-
SHA1
00822a589f22f9d72a9057a4c697273b7370eb58
-
SHA256
aab513d16f0e41a492b3054d1bf0e2f63980c8ecbeaf401f88631f771f169f93
-
SHA512
8a79ecfdedcf514af38e35491b5061523eb0fa473ad7eb920084d360fb76bc802775fcf4af42e49ca60b7c8e9772c34246272591830a65189ac0b6d35e1c74c0
-
SSDEEP
49152:uhua8pMpRzsOV9bzmkSMDgOPIOY9ayVyPxCr5G:uhudpWHyX9G
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-