General
-
Target
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78
-
Size
4.7MB
-
Sample
241224-hf1nesspdk
-
MD5
70c12d165447f87ff61df4e53a99664c
-
SHA1
28ac1a4b6bce3d701a225e18ac55a1453b1a4587
-
SHA256
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78
-
SHA512
c4e121e9b6e7639eccb1c7d6a6c7678596a5b5f678bffd6e21e406970d2776d25ba02980bd4e3a58155b585c7cd58777410411ef7c8cce98d07caf3282c6066e
-
SSDEEP
98304:iS/AJyfIt/NvRJOJu4OGt9XY9iY9GoBNmuJApVxHXhLYjbsDx99C:tAj6ROgJY9iY95Y5HxLYvsn9C
Static task
static1
Behavioral task
behavioral1
Sample
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78
-
Size
4.7MB
-
MD5
70c12d165447f87ff61df4e53a99664c
-
SHA1
28ac1a4b6bce3d701a225e18ac55a1453b1a4587
-
SHA256
d5e8d0763604a55097723aadfc47a3e5324419001a81a0104d77cd39248fab78
-
SHA512
c4e121e9b6e7639eccb1c7d6a6c7678596a5b5f678bffd6e21e406970d2776d25ba02980bd4e3a58155b585c7cd58777410411ef7c8cce98d07caf3282c6066e
-
SSDEEP
98304:iS/AJyfIt/NvRJOJu4OGt9XY9iY9GoBNmuJApVxHXhLYjbsDx99C:tAj6ROgJY9iY95Y5HxLYvsn9C
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-