General
-
Target
01d819892c01e735906072ecd4873332dad9ee97d3d8d7e51254332e2b17fd1aN.exe
-
Size
1.2MB
-
Sample
241217-cbgrvsxpcp
-
MD5
60c9d4d502691012277cee2e0baa05b0
-
SHA1
6e06a52f818a371749154d395e678bdb6198bb80
-
SHA256
01d819892c01e735906072ecd4873332dad9ee97d3d8d7e51254332e2b17fd1a
-
SHA512
27c5bbee99c6f8999646af018254a1d1bb28b4cd6c28c99975fc2543dc371b4e6e1e1004c57cbd31411c31640170fd3253236c62b687755564dd0e1d957456f5
-
SSDEEP
24576:PFOasuFWa8ivtCXWeGKVFGXFmUQlEk41/iOvJ4icghvMArEH7w:touNtCXWP0c1mzlEHRi64icghkw
Static task
static1
Behavioral task
behavioral1
Sample
01d819892c01e735906072ecd4873332dad9ee97d3d8d7e51254332e2b17fd1aN.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
01d819892c01e735906072ecd4873332dad9ee97d3d8d7e51254332e2b17fd1aN.exe
-
Size
1.2MB
-
MD5
60c9d4d502691012277cee2e0baa05b0
-
SHA1
6e06a52f818a371749154d395e678bdb6198bb80
-
SHA256
01d819892c01e735906072ecd4873332dad9ee97d3d8d7e51254332e2b17fd1a
-
SHA512
27c5bbee99c6f8999646af018254a1d1bb28b4cd6c28c99975fc2543dc371b4e6e1e1004c57cbd31411c31640170fd3253236c62b687755564dd0e1d957456f5
-
SSDEEP
24576:PFOasuFWa8ivtCXWeGKVFGXFmUQlEk41/iOvJ4icghvMArEH7w:touNtCXWP0c1mzlEHRi64icghkw
-
Floxif family
-
Modifies visiblity of hidden/system files in Explorer
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1