General
-
Target
60a14c77d554b8fe95171c3d5d897fb0bfec1d09b1bcc975f7088f6341ecbe03
-
Size
861KB
-
Sample
241231-2ydq6awndj
-
MD5
ed6833ce7eee0c04698862f413344481
-
SHA1
f2dbc33a402940788576b96e11c0aef01c0f3283
-
SHA256
60a14c77d554b8fe95171c3d5d897fb0bfec1d09b1bcc975f7088f6341ecbe03
-
SHA512
5a47acee6c1d91b49e521880bc7dc40ebc91450b5f899432c32c9779d0a85f15b6aa1601783bd1a1dcd289f400abac48fe78c713ff3807f6c8fc93efffad9ea9
-
SSDEEP
12288:VqFcULbbGlN+sPIfzvE5eMzQ3Aj3aqv2xORxPSH0kbAPPA5BjvrEH7N:KLbzokE6Aj33Rx0AQnrEH7N
Static task
static1
Behavioral task
behavioral1
Sample
60a14c77d554b8fe95171c3d5d897fb0bfec1d09b1bcc975f7088f6341ecbe03.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
60a14c77d554b8fe95171c3d5d897fb0bfec1d09b1bcc975f7088f6341ecbe03.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
60a14c77d554b8fe95171c3d5d897fb0bfec1d09b1bcc975f7088f6341ecbe03
-
Size
861KB
-
MD5
ed6833ce7eee0c04698862f413344481
-
SHA1
f2dbc33a402940788576b96e11c0aef01c0f3283
-
SHA256
60a14c77d554b8fe95171c3d5d897fb0bfec1d09b1bcc975f7088f6341ecbe03
-
SHA512
5a47acee6c1d91b49e521880bc7dc40ebc91450b5f899432c32c9779d0a85f15b6aa1601783bd1a1dcd289f400abac48fe78c713ff3807f6c8fc93efffad9ea9
-
SSDEEP
12288:VqFcULbbGlN+sPIfzvE5eMzQ3Aj3aqv2xORxPSH0kbAPPA5BjvrEH7N:KLbzokE6Aj33Rx0AQnrEH7N
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-