General
-
Target
c404ed99ccd49615f1069564d57c526afe4559d7aff0b54ed4dcd0e14ff4ed5c
-
Size
286KB
-
Sample
241217-gpydzstldl
-
MD5
3c88c0650974a96d7334468a992fa19c
-
SHA1
1106e4b98b662f1991ffefcabb49501a637df6ad
-
SHA256
c404ed99ccd49615f1069564d57c526afe4559d7aff0b54ed4dcd0e14ff4ed5c
-
SHA512
14d025bdd0ca4653dd046ec6f01ebb402112c94314b90ef8052a6634db47d94a161c6addd5ad129d6fb9e15537caf01169faf6ba120ac99157641bcfe5cfa9fe
-
SSDEEP
6144:bt7gKNkhSR/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKe6kqK:bt7gKNkhm/JuyXnPB+h8WHlBjvrEH7PN
Static task
static1
Behavioral task
behavioral1
Sample
c404ed99ccd49615f1069564d57c526afe4559d7aff0b54ed4dcd0e14ff4ed5c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c404ed99ccd49615f1069564d57c526afe4559d7aff0b54ed4dcd0e14ff4ed5c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c404ed99ccd49615f1069564d57c526afe4559d7aff0b54ed4dcd0e14ff4ed5c
-
Size
286KB
-
MD5
3c88c0650974a96d7334468a992fa19c
-
SHA1
1106e4b98b662f1991ffefcabb49501a637df6ad
-
SHA256
c404ed99ccd49615f1069564d57c526afe4559d7aff0b54ed4dcd0e14ff4ed5c
-
SHA512
14d025bdd0ca4653dd046ec6f01ebb402112c94314b90ef8052a6634db47d94a161c6addd5ad129d6fb9e15537caf01169faf6ba120ac99157641bcfe5cfa9fe
-
SSDEEP
6144:bt7gKNkhSR/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKe6kqK:bt7gKNkhm/JuyXnPB+h8WHlBjvrEH7PN
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-