General
-
Target
e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52
-
Size
554KB
-
Sample
241222-b742laykbt
-
MD5
7238a5ed89e3be13c3b6ea3ee0e39540
-
SHA1
0b0d6a91097cb3b7d56f061aa32de8c16557fae5
-
SHA256
e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52
-
SHA512
546c5a2df624d8a67e95d7a8c0f511e292f94394f2845d432a57c8573ffadfc068df0298ca4da63a2bc61b6439a2f6615153b86129f450320af9aec714e4714d
-
SSDEEP
12288:dNaDfsMMSsMMfBvMcsCMcs/fkx0+RtV1QLttnu3R1MZEJIXBjvrEH7J:dIDfsMMSsMMfBvMcsCMcs/M0+RmJtuTT
Static task
static1
Behavioral task
behavioral1
Sample
e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52
-
Size
554KB
-
MD5
7238a5ed89e3be13c3b6ea3ee0e39540
-
SHA1
0b0d6a91097cb3b7d56f061aa32de8c16557fae5
-
SHA256
e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52
-
SHA512
546c5a2df624d8a67e95d7a8c0f511e292f94394f2845d432a57c8573ffadfc068df0298ca4da63a2bc61b6439a2f6615153b86129f450320af9aec714e4714d
-
SSDEEP
12288:dNaDfsMMSsMMfBvMcsCMcs/fkx0+RtV1QLttnu3R1MZEJIXBjvrEH7J:dIDfsMMSsMMfBvMcsCMcs/M0+RmJtuTT
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-