General
-
Target
2025-01-02_2c828e7dab6184490b41c57787340c0a_floxif_frostygoop_hijackloader_poet-rat_snatch
-
Size
31.9MB
-
Sample
250102-qwslrawqbq
-
MD5
2c828e7dab6184490b41c57787340c0a
-
SHA1
301dcc3edb0758213f833e7453822fd0b7a7c4a3
-
SHA256
63b52084efd5f180601bc6dcc95bf82e9b8b6f4b8ea76a695d6fc304f50a6e72
-
SHA512
58cce253dbb75fbbf845a59f6cb15c3a37e522c3f855d75367f7562c7cc5a4cac4bc2aab95a2106732a3bf2750621c0b8e01f6bff34549bcdd336d69c0675732
-
SSDEEP
393216:y1AEqI0BA0r3+eaWeIvcYWQFpelJ4DBmcv:y1nZIkYWQFpelJ4DTv
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-02_2c828e7dab6184490b41c57787340c0a_floxif_frostygoop_hijackloader_poet-rat_snatch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-02_2c828e7dab6184490b41c57787340c0a_floxif_frostygoop_hijackloader_poet-rat_snatch.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-02_2c828e7dab6184490b41c57787340c0a_floxif_frostygoop_hijackloader_poet-rat_snatch
-
Size
31.9MB
-
MD5
2c828e7dab6184490b41c57787340c0a
-
SHA1
301dcc3edb0758213f833e7453822fd0b7a7c4a3
-
SHA256
63b52084efd5f180601bc6dcc95bf82e9b8b6f4b8ea76a695d6fc304f50a6e72
-
SHA512
58cce253dbb75fbbf845a59f6cb15c3a37e522c3f855d75367f7562c7cc5a4cac4bc2aab95a2106732a3bf2750621c0b8e01f6bff34549bcdd336d69c0675732
-
SSDEEP
393216:y1AEqI0BA0r3+eaWeIvcYWQFpelJ4DBmcv:y1nZIkYWQFpelJ4DTv
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-