General
-
Target
0e25733afe02522e44cfacf326cbff4d028e49d693e470bd96ed59f2682a9a87
-
Size
6.4MB
-
Sample
241224-hf1nesspdl
-
MD5
62f8b6ce0fb21498e19e70643b28d5fd
-
SHA1
318656a684132e728a1115123a4412539875b445
-
SHA256
0e25733afe02522e44cfacf326cbff4d028e49d693e470bd96ed59f2682a9a87
-
SHA512
633a0db0b41f7d829bde23410b57b4cfdc1a9e030730a7ee3034d943a23391ba31c58a0111adf25ff4deb9607703ecabf4bf9fd90b1e8fdea475bbc30b975a2c
-
SSDEEP
98304:WfiJUk96GQyUb0D7PI2S02XIVn8tIT1rZ4t5oazq/BldHW6PDdlOVhQP35:WfNk+DE7PI+QITU9WrdHW6PZlcC
Static task
static1
Behavioral task
behavioral1
Sample
0e25733afe02522e44cfacf326cbff4d028e49d693e470bd96ed59f2682a9a87.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
0e25733afe02522e44cfacf326cbff4d028e49d693e470bd96ed59f2682a9a87
-
Size
6.4MB
-
MD5
62f8b6ce0fb21498e19e70643b28d5fd
-
SHA1
318656a684132e728a1115123a4412539875b445
-
SHA256
0e25733afe02522e44cfacf326cbff4d028e49d693e470bd96ed59f2682a9a87
-
SHA512
633a0db0b41f7d829bde23410b57b4cfdc1a9e030730a7ee3034d943a23391ba31c58a0111adf25ff4deb9607703ecabf4bf9fd90b1e8fdea475bbc30b975a2c
-
SSDEEP
98304:WfiJUk96GQyUb0D7PI2S02XIVn8tIT1rZ4t5oazq/BldHW6PDdlOVhQP35:WfNk+DE7PI+QITU9WrdHW6PZlcC
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks for any installed AV software in registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2