General
-
Target
fdeede4ef69c0e0a3a3a4748b820debc7ea611f17176c996e47feeb27b37c6b5
-
Size
745KB
-
Sample
241227-e833gasjgr
-
MD5
7a1ec2f3d646e9309d5eb617d8122ca2
-
SHA1
5ae63ea2dabb2936d1de4e530692c508ff7826bb
-
SHA256
fdeede4ef69c0e0a3a3a4748b820debc7ea611f17176c996e47feeb27b37c6b5
-
SHA512
6690d28294e80325d29f91c7d09fa07973dc96530f3e704a50fc3eb82d9c7c9935d2027b85ac795b15b8c7d048b4a5de1b2c29bf85e4f61f77bfe9e29f34c81a
-
SSDEEP
12288:DTyjXW+48qWywrU4kGFezOAVuJ5PILOHF5DO3HYff+MRGM4h/qof23O:fIXW/8yw1ez54lIEF5SXYH+MRGJ/qofV
Static task
static1
Behavioral task
behavioral1
Sample
fdeede4ef69c0e0a3a3a4748b820debc7ea611f17176c996e47feeb27b37c6b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fdeede4ef69c0e0a3a3a4748b820debc7ea611f17176c996e47feeb27b37c6b5.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
fdeede4ef69c0e0a3a3a4748b820debc7ea611f17176c996e47feeb27b37c6b5
-
Size
745KB
-
MD5
7a1ec2f3d646e9309d5eb617d8122ca2
-
SHA1
5ae63ea2dabb2936d1de4e530692c508ff7826bb
-
SHA256
fdeede4ef69c0e0a3a3a4748b820debc7ea611f17176c996e47feeb27b37c6b5
-
SHA512
6690d28294e80325d29f91c7d09fa07973dc96530f3e704a50fc3eb82d9c7c9935d2027b85ac795b15b8c7d048b4a5de1b2c29bf85e4f61f77bfe9e29f34c81a
-
SSDEEP
12288:DTyjXW+48qWywrU4kGFezOAVuJ5PILOHF5DO3HYff+MRGM4h/qof23O:fIXW/8yw1ez54lIEF5SXYH+MRGJ/qofV
-
Floxif family
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
3