General
-
Target
83f4adc3e33552b3c5230c4af8ce9dfa45d7cb108212c5314b75da347302af23
-
Size
375KB
-
Sample
241226-hmy36szjfr
-
MD5
441f9d1b31f6a618860c3002269473c4
-
SHA1
ca35b32339a3c2b88f75714ed607ab8b050eb7c5
-
SHA256
83f4adc3e33552b3c5230c4af8ce9dfa45d7cb108212c5314b75da347302af23
-
SHA512
7b92730bc03064f8a697ac08438e75f2c0ee4d11398117ab3798b91a827a2fd7275aeec8f3d742dda8bb6e2b418acbc42e195521260758e3f18a90c4f12f51d6
-
SSDEEP
6144:UQePa/g7rQGDa3e79hsA5XhXo9ji9SxCFLM0oS5POGxBV+UdvrEFp7hKvN:UQIA6vr5XuW6Cd9oSfBjvrEH72N
Static task
static1
Behavioral task
behavioral1
Sample
83f4adc3e33552b3c5230c4af8ce9dfa45d7cb108212c5314b75da347302af23.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
83f4adc3e33552b3c5230c4af8ce9dfa45d7cb108212c5314b75da347302af23.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
83f4adc3e33552b3c5230c4af8ce9dfa45d7cb108212c5314b75da347302af23
-
Size
375KB
-
MD5
441f9d1b31f6a618860c3002269473c4
-
SHA1
ca35b32339a3c2b88f75714ed607ab8b050eb7c5
-
SHA256
83f4adc3e33552b3c5230c4af8ce9dfa45d7cb108212c5314b75da347302af23
-
SHA512
7b92730bc03064f8a697ac08438e75f2c0ee4d11398117ab3798b91a827a2fd7275aeec8f3d742dda8bb6e2b418acbc42e195521260758e3f18a90c4f12f51d6
-
SSDEEP
6144:UQePa/g7rQGDa3e79hsA5XhXo9ji9SxCFLM0oS5POGxBV+UdvrEFp7hKvN:UQIA6vr5XuW6Cd9oSfBjvrEH72N
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-