General
-
Target
d408f40fd2979d73b658e619d1792652d8bbb95547a6f0f9821cf7f189108913N.exe
-
Size
136KB
-
Sample
241225-3vedys1pgy
-
MD5
586eb0ffc1a056e2d06eaa3f8329c6e0
-
SHA1
1c12e93ea46aa7c71105e4a96ac0bcb72f6bae4c
-
SHA256
d408f40fd2979d73b658e619d1792652d8bbb95547a6f0f9821cf7f189108913
-
SHA512
0b0ff453af9a23e2ecd06bf7e0fc95954719bab0dd6331462a41292bdd8c08bce4e92112c92d536f0f008e0d046d849a9af5addaddb83e3fd3fd6b6ca50e06ba
-
SSDEEP
3072:2QIPfTXJ+9OvQRIpY2lQBV+UdE+rECWp7hKgx76PR:2Zb49nReGBV+UdvrEFp7hKgx25
Static task
static1
Behavioral task
behavioral1
Sample
d408f40fd2979d73b658e619d1792652d8bbb95547a6f0f9821cf7f189108913N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d408f40fd2979d73b658e619d1792652d8bbb95547a6f0f9821cf7f189108913N.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
d408f40fd2979d73b658e619d1792652d8bbb95547a6f0f9821cf7f189108913N.exe
-
Size
136KB
-
MD5
586eb0ffc1a056e2d06eaa3f8329c6e0
-
SHA1
1c12e93ea46aa7c71105e4a96ac0bcb72f6bae4c
-
SHA256
d408f40fd2979d73b658e619d1792652d8bbb95547a6f0f9821cf7f189108913
-
SHA512
0b0ff453af9a23e2ecd06bf7e0fc95954719bab0dd6331462a41292bdd8c08bce4e92112c92d536f0f008e0d046d849a9af5addaddb83e3fd3fd6b6ca50e06ba
-
SSDEEP
3072:2QIPfTXJ+9OvQRIpY2lQBV+UdE+rECWp7hKgx76PR:2Zb49nReGBV+UdvrEFp7hKgx25
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
$PLUGINSDIR/FindProcDLL.dll
-
Size
3KB
-
MD5
75e7351a0f836b8659e6f315683c29f7
-
SHA1
66b733d1c978d68cadc245e7efbfcae32807429d
-
SHA256
7ffc549e7f679a08c77fa230654b77cdffb3444296bb7c6b8b5769db374b61ee
-
SHA512
f03400798b07ccca5e12fa119a586ee9444deb0d2419aced24d93fd84a4702d66864a71b40a11b04b1dbe56e36481cd6a644aec0347bc82bc7375b27bc403fe4
Score3/10 -
-
-
Target
$PLUGINSDIR/StdUtils.dll
-
Size
14KB
-
MD5
21010df9bc37daffcc0b5ae190381d85
-
SHA1
a8ba022aafc1233894db29e40e569dfc8b280eb9
-
SHA256
0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
-
SHA512
95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
SSDEEP
192:OFb8Y8oqy2mqZc9hGBQHRx39oRxmMvURkB/Fs:qb8Y8nKqohGBKxox9vURw/a
Score3/10 -