General
-
Target
28320e37f78684d5e3aedfe0eccae074a66833c25ce34e811fbc99411f8d9b46N.exe
-
Size
205KB
-
Sample
250102-ew37pssqet
-
MD5
70a59c5b3f30b03a244339db10f54710
-
SHA1
fc3596aea8ee60c232e590102a2a189ee41d464c
-
SHA256
28320e37f78684d5e3aedfe0eccae074a66833c25ce34e811fbc99411f8d9b46
-
SHA512
1f839afec2c5968e5e91165e9465340440a486c1c65b59b8f590cd75413a32f6ebc13a03f726bc9ee076ee64f47d8357decb61f12b339fa62a580551208ef8af
-
SSDEEP
3072:tZx8gJs7HnU+JOoutueXlt2lQBV+UdE+rECWp7hK6:v2As7HnUroS3BV+UdvrEFp7hK6
Behavioral task
behavioral1
Sample
28320e37f78684d5e3aedfe0eccae074a66833c25ce34e811fbc99411f8d9b46N.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
28320e37f78684d5e3aedfe0eccae074a66833c25ce34e811fbc99411f8d9b46N.exe
-
Size
205KB
-
MD5
70a59c5b3f30b03a244339db10f54710
-
SHA1
fc3596aea8ee60c232e590102a2a189ee41d464c
-
SHA256
28320e37f78684d5e3aedfe0eccae074a66833c25ce34e811fbc99411f8d9b46
-
SHA512
1f839afec2c5968e5e91165e9465340440a486c1c65b59b8f590cd75413a32f6ebc13a03f726bc9ee076ee64f47d8357decb61f12b339fa62a580551208ef8af
-
SSDEEP
3072:tZx8gJs7HnU+JOoutueXlt2lQBV+UdE+rECWp7hK6:v2As7HnUroS3BV+UdvrEFp7hK6
-
Floxif family
-
Detects Floxif payload
-
Drops file in Drivers directory
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
5