General
-
Target
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220fN.exe
-
Size
815KB
-
Sample
241219-lb42tsyper
-
MD5
6f338b0d8b648b27f0e24cd039443710
-
SHA1
b4fae72c22350e439e3dbd17614c37a6ecfcdbda
-
SHA256
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220f
-
SHA512
b034720321e33c0c930c0aa60cfede911b493fea3ad6ae19b8fb086254abfb72c2493b1616cc309a7ee02876d75457c0df90996fe030287d5b750ee614007b78
-
SSDEEP
24576:miOWmE9/SsSCpyaUk3qPb7hxavnMRGJ/qofTW:Bz9/SNCdUkELQB1qz
Static task
static1
Behavioral task
behavioral1
Sample
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220fN.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220fN.exe
-
Size
815KB
-
MD5
6f338b0d8b648b27f0e24cd039443710
-
SHA1
b4fae72c22350e439e3dbd17614c37a6ecfcdbda
-
SHA256
28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220f
-
SHA512
b034720321e33c0c930c0aa60cfede911b493fea3ad6ae19b8fb086254abfb72c2493b1616cc309a7ee02876d75457c0df90996fe030287d5b750ee614007b78
-
SSDEEP
24576:miOWmE9/SsSCpyaUk3qPb7hxavnMRGJ/qofTW:Bz9/SNCdUkELQB1qz
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-