General
-
Target
91bbe0850cd8ba0bbe38f3a756f8d16918e1e465af6d45428e55e9d4916087a4N.exe
-
Size
772KB
-
Sample
241226-q8t1caxjdv
-
MD5
050100011329a398cc16587663211d00
-
SHA1
2e6484d1b3b20a95ce455cb23de3f3d7deda94d3
-
SHA256
91bbe0850cd8ba0bbe38f3a756f8d16918e1e465af6d45428e55e9d4916087a4
-
SHA512
eee670080d753f4539dedf8f35b75fa86b8f328a66bbe0f4f066b28cc88b2414d51b058f778ba5d8a91df1071963b20f689f0f0d26b236f02508c073cdb5bea9
-
SSDEEP
24576:eKWs7L6NuGpVUg71KEJ5wTqLdNXrEH78G:7F72Nlp6EQ6xdc
Static task
static1
Behavioral task
behavioral1
Sample
91bbe0850cd8ba0bbe38f3a756f8d16918e1e465af6d45428e55e9d4916087a4N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
91bbe0850cd8ba0bbe38f3a756f8d16918e1e465af6d45428e55e9d4916087a4N.exe
-
Size
772KB
-
MD5
050100011329a398cc16587663211d00
-
SHA1
2e6484d1b3b20a95ce455cb23de3f3d7deda94d3
-
SHA256
91bbe0850cd8ba0bbe38f3a756f8d16918e1e465af6d45428e55e9d4916087a4
-
SHA512
eee670080d753f4539dedf8f35b75fa86b8f328a66bbe0f4f066b28cc88b2414d51b058f778ba5d8a91df1071963b20f689f0f0d26b236f02508c073cdb5bea9
-
SSDEEP
24576:eKWs7L6NuGpVUg71KEJ5wTqLdNXrEH78G:7F72Nlp6EQ6xdc
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-