General
-
Target
2b66c2bfa1af9c0b5d50d73a484b50e4c6e801b41e83da7b5adb9ebda82ba168
-
Size
286KB
-
Sample
241223-s41cnstmfl
-
MD5
c2018836e27455b2196c4f8ba623cb6d
-
SHA1
82855b5020c0b8c2894192ad15d7b227e9fc6bcd
-
SHA256
2b66c2bfa1af9c0b5d50d73a484b50e4c6e801b41e83da7b5adb9ebda82ba168
-
SHA512
d67c6b49936810cf79fff616b90bd01592eaa414d18873ef79c2bed32980c2e6103b91934fb958e1f9216024bbc084a3a8533dc42de9b6185257532d34b84eeb
-
SSDEEP
6144:L70l/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKh:L70l/JuyXnPB+h8WHlBjvrEH7W
Static task
static1
Behavioral task
behavioral1
Sample
2b66c2bfa1af9c0b5d50d73a484b50e4c6e801b41e83da7b5adb9ebda82ba168.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2b66c2bfa1af9c0b5d50d73a484b50e4c6e801b41e83da7b5adb9ebda82ba168
-
Size
286KB
-
MD5
c2018836e27455b2196c4f8ba623cb6d
-
SHA1
82855b5020c0b8c2894192ad15d7b227e9fc6bcd
-
SHA256
2b66c2bfa1af9c0b5d50d73a484b50e4c6e801b41e83da7b5adb9ebda82ba168
-
SHA512
d67c6b49936810cf79fff616b90bd01592eaa414d18873ef79c2bed32980c2e6103b91934fb958e1f9216024bbc084a3a8533dc42de9b6185257532d34b84eeb
-
SSDEEP
6144:L70l/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKh:L70l/JuyXnPB+h8WHlBjvrEH7W
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-