General
-
Target
53640fc98a7a72e038c6e2369cda0a0a44bdb161f429bae5b9bf382e5f45bdd3
-
Size
253KB
-
Sample
241222-2dj3fa1kdy
-
MD5
c1c5d3c46eea3ba5671873c31331c9da
-
SHA1
759b6d9312de0a2b48b71c775337b79c7343fdde
-
SHA256
53640fc98a7a72e038c6e2369cda0a0a44bdb161f429bae5b9bf382e5f45bdd3
-
SHA512
71ced31eb2ce82cf36ea41897659543c55edf7318098b033126ef8aef6d834355aeef66e073fd9465753f3c11c2776e9751e1f290ad1aa732c8eedb0c723c3ef
-
SSDEEP
6144:CaNZqIFN2yNdk/TXB615i9NTPjhIBsgKBV+UdvrEFp7hK5:Ca/3Td2Xwn0NjVIBs9BjvrEH7u
Static task
static1
Behavioral task
behavioral1
Sample
53640fc98a7a72e038c6e2369cda0a0a44bdb161f429bae5b9bf382e5f45bdd3.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
53640fc98a7a72e038c6e2369cda0a0a44bdb161f429bae5b9bf382e5f45bdd3
-
Size
253KB
-
MD5
c1c5d3c46eea3ba5671873c31331c9da
-
SHA1
759b6d9312de0a2b48b71c775337b79c7343fdde
-
SHA256
53640fc98a7a72e038c6e2369cda0a0a44bdb161f429bae5b9bf382e5f45bdd3
-
SHA512
71ced31eb2ce82cf36ea41897659543c55edf7318098b033126ef8aef6d834355aeef66e073fd9465753f3c11c2776e9751e1f290ad1aa732c8eedb0c723c3ef
-
SSDEEP
6144:CaNZqIFN2yNdk/TXB615i9NTPjhIBsgKBV+UdvrEFp7hK5:Ca/3Td2Xwn0NjVIBs9BjvrEH7u
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-