General
-
Target
2025-01-01_b1d770317fb04d15f486f0d07f829462_floxif_poet-rat_snatch
-
Size
17.9MB
-
Sample
250101-nq27wswmdp
-
MD5
b1d770317fb04d15f486f0d07f829462
-
SHA1
5135bef72a25cab842e7dd43a8fe241622b5f158
-
SHA256
5f1824bce5571dab46818cb0f24e9af00a5e2620055bd0b7abfd7e625bd3c98b
-
SHA512
25b3b8aa6d505769d2e97d49005f2635641a7d3b416c8fa6df2bf1c433e1c19eba420a1bde8ccf460f340ba90bbca197d1fce69aa809c7964ca8c2786a953299
-
SSDEEP
196608:h+of/vx9oiqeESF+64twvjf27jYXg5gG+VbzFZhIZtxTyA6LMDOTbJWy:T5dqeDju3YXg5gV1uvx6LM6Iy
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-01_b1d770317fb04d15f486f0d07f829462_floxif_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-01_b1d770317fb04d15f486f0d07f829462_floxif_poet-rat_snatch
-
Size
17.9MB
-
MD5
b1d770317fb04d15f486f0d07f829462
-
SHA1
5135bef72a25cab842e7dd43a8fe241622b5f158
-
SHA256
5f1824bce5571dab46818cb0f24e9af00a5e2620055bd0b7abfd7e625bd3c98b
-
SHA512
25b3b8aa6d505769d2e97d49005f2635641a7d3b416c8fa6df2bf1c433e1c19eba420a1bde8ccf460f340ba90bbca197d1fce69aa809c7964ca8c2786a953299
-
SSDEEP
196608:h+of/vx9oiqeESF+64twvjf27jYXg5gG+VbzFZhIZtxTyA6LMDOTbJWy:T5dqeDju3YXg5gV1uvx6LM6Iy
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-