General
-
Target
b0317d04cea216c71968feec3a7cbed54a1a8ed27b687c4f98c5be0952eddd8bN.exe
-
Size
1.4MB
-
Sample
250101-2rgjgayncv
-
MD5
57ec0f36f5e75cc1db4661544f29b7a0
-
SHA1
5bf518f39b7397df82015e8eb932d155c039333b
-
SHA256
b0317d04cea216c71968feec3a7cbed54a1a8ed27b687c4f98c5be0952eddd8b
-
SHA512
d648382fc598bc1fd30deff94443161265d88d0ae895e39bef647da57938b718a79791aebccf21e98826bbbae855020977d7a0903d2b0c5996a201428304eb47
-
SSDEEP
12288:CVq0SA9h1SxfJ4yb+QdIKYKNCJKHZDgdVw8XkLavV2Q9yW+GGYT7SLHBjvrEH7TU:Mpb1SxfJ4yL/tNCJPXUQrP4FrEH7w
Static task
static1
Behavioral task
behavioral1
Sample
b0317d04cea216c71968feec3a7cbed54a1a8ed27b687c4f98c5be0952eddd8bN.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b0317d04cea216c71968feec3a7cbed54a1a8ed27b687c4f98c5be0952eddd8bN.exe
-
Size
1.4MB
-
MD5
57ec0f36f5e75cc1db4661544f29b7a0
-
SHA1
5bf518f39b7397df82015e8eb932d155c039333b
-
SHA256
b0317d04cea216c71968feec3a7cbed54a1a8ed27b687c4f98c5be0952eddd8b
-
SHA512
d648382fc598bc1fd30deff94443161265d88d0ae895e39bef647da57938b718a79791aebccf21e98826bbbae855020977d7a0903d2b0c5996a201428304eb47
-
SSDEEP
12288:CVq0SA9h1SxfJ4yb+QdIKYKNCJKHZDgdVw8XkLavV2Q9yW+GGYT7SLHBjvrEH7TU:Mpb1SxfJ4yL/tNCJPXUQrP4FrEH7w
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1