General
-
Target
e8f265594d1d17b45a9cb5a7057a30f88dd34bcb03d4273ef9bb6c31340ab2eeN.exe
-
Size
2.5MB
-
Sample
241225-wyltwa1qhs
-
MD5
00ba7df1ab0f880c93f0bca472e30e40
-
SHA1
0cc279881f0c1bb7d7549540aef7134110bd95e8
-
SHA256
e8f265594d1d17b45a9cb5a7057a30f88dd34bcb03d4273ef9bb6c31340ab2ee
-
SHA512
5ad39ea19d2991c5814b78de3493fcd9b8ba2aa2a08575b6437b1ada5740dd205cff41e61bc8eaec2861c0ffe99d806ce1bfb811d179ad4eb9dc67651cf84fa2
-
SSDEEP
49152:1KiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTe:+rZ23AbsK6Ro022JjL2WEiVqJZe
Static task
static1
Behavioral task
behavioral1
Sample
e8f265594d1d17b45a9cb5a7057a30f88dd34bcb03d4273ef9bb6c31340ab2eeN.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
e8f265594d1d17b45a9cb5a7057a30f88dd34bcb03d4273ef9bb6c31340ab2eeN.exe
-
Size
2.5MB
-
MD5
00ba7df1ab0f880c93f0bca472e30e40
-
SHA1
0cc279881f0c1bb7d7549540aef7134110bd95e8
-
SHA256
e8f265594d1d17b45a9cb5a7057a30f88dd34bcb03d4273ef9bb6c31340ab2ee
-
SHA512
5ad39ea19d2991c5814b78de3493fcd9b8ba2aa2a08575b6437b1ada5740dd205cff41e61bc8eaec2861c0ffe99d806ce1bfb811d179ad4eb9dc67651cf84fa2
-
SSDEEP
49152:1KiC/rk62xWNol+5gOsLO66qJ6021cJjLtk4pWGNG5VGFPNqJyoTe:+rZ23AbsK6Ro022JjL2WEiVqJZe
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-