General
-
Target
c98db560a5d8d3945767943d103499ccdebf228ceefd6804e4e5650acf3243be
-
Size
286KB
-
Sample
241222-gg399swlfs
-
MD5
52a6bca8c2019af87388bcf921c93e79
-
SHA1
2cb67303965c6394c72e3f3ad65b7170caf78cfa
-
SHA256
c98db560a5d8d3945767943d103499ccdebf228ceefd6804e4e5650acf3243be
-
SHA512
44d23d2eb845e0222c011364a78da4e82cf6dcfb6809075d181772e9891057df189981e3406d97daa6f1d37a092206bd047986cf9125c3ee1b1d3b0f6c994e68
-
SSDEEP
6144:27gKNkhhCkHouyXnZhB+h8WHlBV+UdvrEFp7hKsI:27gKNkhh8uyXnPB+h8WHlBjvrEH75I
Static task
static1
Behavioral task
behavioral1
Sample
c98db560a5d8d3945767943d103499ccdebf228ceefd6804e4e5650acf3243be.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
c98db560a5d8d3945767943d103499ccdebf228ceefd6804e4e5650acf3243be
-
Size
286KB
-
MD5
52a6bca8c2019af87388bcf921c93e79
-
SHA1
2cb67303965c6394c72e3f3ad65b7170caf78cfa
-
SHA256
c98db560a5d8d3945767943d103499ccdebf228ceefd6804e4e5650acf3243be
-
SHA512
44d23d2eb845e0222c011364a78da4e82cf6dcfb6809075d181772e9891057df189981e3406d97daa6f1d37a092206bd047986cf9125c3ee1b1d3b0f6c994e68
-
SSDEEP
6144:27gKNkhhCkHouyXnZhB+h8WHlBV+UdvrEFp7hKsI:27gKNkhh8uyXnPB+h8WHlBjvrEH75I
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-