General
-
Target
b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2N.exe
-
Size
648KB
-
Sample
250101-183ycsxnet
-
MD5
60f72f4929966e926b8b91edf4c359f0
-
SHA1
f9aa35728ac81c11067617d1c7c47d53a5bc4a77
-
SHA256
b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2
-
SHA512
b89f831e53a8efe1dab95acc6f56efb0bbc4eec8ccf451b1898b4964e3f1185532c3ce028badff46109dc59752e602b2676dd4c5ceed57eec24bbeea641e014d
-
SSDEEP
12288:UdUE+hyihAOkwDkaoHmkN04kFMQ2p7jk7G8VsiAP7A5C2mHBjvrEH7b:UPYATIkdBRx7jkK8VsiEMmFrEH7b
Behavioral task
behavioral1
Sample
b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2N.exe
-
Size
648KB
-
MD5
60f72f4929966e926b8b91edf4c359f0
-
SHA1
f9aa35728ac81c11067617d1c7c47d53a5bc4a77
-
SHA256
b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2
-
SHA512
b89f831e53a8efe1dab95acc6f56efb0bbc4eec8ccf451b1898b4964e3f1185532c3ce028badff46109dc59752e602b2676dd4c5ceed57eec24bbeea641e014d
-
SSDEEP
12288:UdUE+hyihAOkwDkaoHmkN04kFMQ2p7jk7G8VsiAP7A5C2mHBjvrEH7b:UPYATIkdBRx7jkK8VsiEMmFrEH7b
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-