General
-
Target
b6599377f1e4686746e7ad12362093bd2aa908ea13a8c7e3d7dbc154218b82c9
-
Size
469KB
-
Sample
241227-cc56vaynfk
-
MD5
ba1b628ae99b93fd307bc8ca7feaf95d
-
SHA1
7dd8bb41fd6a673b1edd20f7e4734c1ad3ab53e2
-
SHA256
b6599377f1e4686746e7ad12362093bd2aa908ea13a8c7e3d7dbc154218b82c9
-
SHA512
a50ab17c9e62b939ec82f9c8ff05cb6c3175e5d8ab1cf8791b15e289ad6fe1d5b5b58b8cf77a66bb40082c91af890d138b56530564beeb9319a103f4010fc7d7
-
SSDEEP
6144:A6+jDQ6+AWd5SkkdmDQirBV+UdvrEFp7hKAA:eXQkGdkdmDQeBjvrEH7o
Static task
static1
Behavioral task
behavioral1
Sample
b6599377f1e4686746e7ad12362093bd2aa908ea13a8c7e3d7dbc154218b82c9.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
b6599377f1e4686746e7ad12362093bd2aa908ea13a8c7e3d7dbc154218b82c9
-
Size
469KB
-
MD5
ba1b628ae99b93fd307bc8ca7feaf95d
-
SHA1
7dd8bb41fd6a673b1edd20f7e4734c1ad3ab53e2
-
SHA256
b6599377f1e4686746e7ad12362093bd2aa908ea13a8c7e3d7dbc154218b82c9
-
SHA512
a50ab17c9e62b939ec82f9c8ff05cb6c3175e5d8ab1cf8791b15e289ad6fe1d5b5b58b8cf77a66bb40082c91af890d138b56530564beeb9319a103f4010fc7d7
-
SSDEEP
6144:A6+jDQ6+AWd5SkkdmDQirBV+UdvrEFp7hKAA:eXQkGdkdmDQeBjvrEH7o
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-