General
-
Target
f4e82cdd1a0a7329f332b689d76f4b74f6fe613efb8676702ae54e1f9edb41e9
-
Size
273KB
-
Sample
241227-expeya1qbx
-
MD5
69442376dfb774dbd31cce3b92c6c2e0
-
SHA1
d157cd22c3a6ffe328fb07a6b898eb8b6cfb764d
-
SHA256
f4e82cdd1a0a7329f332b689d76f4b74f6fe613efb8676702ae54e1f9edb41e9
-
SHA512
a343462ca1fad77cbdac5b4344f85eb9eebc68a9d7dad31690724fe95d584847ec5070e887f7bae546abbcac82353eb818350f79dea7b051b5f30fef1a846bd3
-
SSDEEP
6144:xlG0ed4OvDzewKLGHj0qTBlznB2dnBV+UdvrEFp7hKSL:xlG0ed4OvXkLGHj0qTDz4BjvrEH7J
Static task
static1
Behavioral task
behavioral1
Sample
f4e82cdd1a0a7329f332b689d76f4b74f6fe613efb8676702ae54e1f9edb41e9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4e82cdd1a0a7329f332b689d76f4b74f6fe613efb8676702ae54e1f9edb41e9.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
f4e82cdd1a0a7329f332b689d76f4b74f6fe613efb8676702ae54e1f9edb41e9
-
Size
273KB
-
MD5
69442376dfb774dbd31cce3b92c6c2e0
-
SHA1
d157cd22c3a6ffe328fb07a6b898eb8b6cfb764d
-
SHA256
f4e82cdd1a0a7329f332b689d76f4b74f6fe613efb8676702ae54e1f9edb41e9
-
SHA512
a343462ca1fad77cbdac5b4344f85eb9eebc68a9d7dad31690724fe95d584847ec5070e887f7bae546abbcac82353eb818350f79dea7b051b5f30fef1a846bd3
-
SSDEEP
6144:xlG0ed4OvDzewKLGHj0qTBlznB2dnBV+UdvrEFp7hKSL:xlG0ed4OvXkLGHj0qTDz4BjvrEH7J
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-