General
-
Target
bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8
-
Size
243KB
-
Sample
241228-r4jt9aymat
-
MD5
a7a5f35e352d552a1f66a1cd8a9a238b
-
SHA1
a41536fd46580c1b736386a460fa2b956627cea9
-
SHA256
bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8
-
SHA512
d94ca2424132446adf49653837ef383cb907fcbd484e8e535d6db0f4c26604637dccb4c750d2bf4ad28727bb73af5eeb16b22acff4fc03970b84cc7e4b1e9814
-
SSDEEP
3072:ewzvOYNa5lRvT/DvbEvK9aobNI2B+DlIH3angqtirxzGlB89Vo6FoCG55lO/X9up:1aTFh9H/B+3ChmBV+UdvrEFp7hKp
Static task
static1
Behavioral task
behavioral1
Sample
bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8
-
Size
243KB
-
MD5
a7a5f35e352d552a1f66a1cd8a9a238b
-
SHA1
a41536fd46580c1b736386a460fa2b956627cea9
-
SHA256
bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8
-
SHA512
d94ca2424132446adf49653837ef383cb907fcbd484e8e535d6db0f4c26604637dccb4c750d2bf4ad28727bb73af5eeb16b22acff4fc03970b84cc7e4b1e9814
-
SSDEEP
3072:ewzvOYNa5lRvT/DvbEvK9aobNI2B+DlIH3angqtirxzGlB89Vo6FoCG55lO/X9up:1aTFh9H/B+3ChmBV+UdvrEFp7hKp
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-