General
-
Target
e144eee4b2d040373838a32461da7d1af2bde052792cd6669641729c5fe9b06a
-
Size
229KB
-
Sample
241223-jnzxjaxpfj
-
MD5
e5ab5b1ab962b6a3ac44d58224a6c8d1
-
SHA1
869c319c750074a3d4f33bf6791aa36c45121b81
-
SHA256
e144eee4b2d040373838a32461da7d1af2bde052792cd6669641729c5fe9b06a
-
SHA512
c8df06c1a447a6b28a432719b77724485be4cdcfd478f42364873858e8f3b9cf5935ca5d425d1e2a282ae06f68abe6632849c8dc48aa0fe187fea7b45070aca5
-
SSDEEP
3072:UAt2SoGOyiTOZQvfSERdX9Zk8AtB+flovvC/Y6V6z5jmVZklFYCFQCexxlG3/Nug:cGIjRsB+Rc2BV+UdvrEFp7hKhNUVq+
Static task
static1
Behavioral task
behavioral1
Sample
e144eee4b2d040373838a32461da7d1af2bde052792cd6669641729c5fe9b06a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e144eee4b2d040373838a32461da7d1af2bde052792cd6669641729c5fe9b06a.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e144eee4b2d040373838a32461da7d1af2bde052792cd6669641729c5fe9b06a
-
Size
229KB
-
MD5
e5ab5b1ab962b6a3ac44d58224a6c8d1
-
SHA1
869c319c750074a3d4f33bf6791aa36c45121b81
-
SHA256
e144eee4b2d040373838a32461da7d1af2bde052792cd6669641729c5fe9b06a
-
SHA512
c8df06c1a447a6b28a432719b77724485be4cdcfd478f42364873858e8f3b9cf5935ca5d425d1e2a282ae06f68abe6632849c8dc48aa0fe187fea7b45070aca5
-
SSDEEP
3072:UAt2SoGOyiTOZQvfSERdX9Zk8AtB+flovvC/Y6V6z5jmVZklFYCFQCexxlG3/Nug:cGIjRsB+Rc2BV+UdvrEFp7hKhNUVq+
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-