General
-
Target
d2473cd43010638c89a36ff0bcb04a3daf2f8ae5a0ad5f88e5ec0c3573052b43
-
Size
213KB
-
Sample
250103-ega8daylds
-
MD5
3fb0926281a95e4e5e7a698a3dbee505
-
SHA1
f0d957281170c2b35392e6ed40688c8ca9b1a624
-
SHA256
d2473cd43010638c89a36ff0bcb04a3daf2f8ae5a0ad5f88e5ec0c3573052b43
-
SHA512
55a35633090d1caef0fe1e7bc4b6a8c4a1cab7e8d453fc419fac5204e0a1bbb18f5293e69e4b2a62754eca8c61fd3353015d3e6ee944ee061dc651b42c33f4f5
-
SSDEEP
6144:KsnkSdQ6mCtnRPF9cCGr/uHkBV+UdvrEFp7hKwUrQ:KsnkinRNh4uHkBjvrEH7ZUrQ
Static task
static1
Behavioral task
behavioral1
Sample
d2473cd43010638c89a36ff0bcb04a3daf2f8ae5a0ad5f88e5ec0c3573052b43.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d2473cd43010638c89a36ff0bcb04a3daf2f8ae5a0ad5f88e5ec0c3573052b43
-
Size
213KB
-
MD5
3fb0926281a95e4e5e7a698a3dbee505
-
SHA1
f0d957281170c2b35392e6ed40688c8ca9b1a624
-
SHA256
d2473cd43010638c89a36ff0bcb04a3daf2f8ae5a0ad5f88e5ec0c3573052b43
-
SHA512
55a35633090d1caef0fe1e7bc4b6a8c4a1cab7e8d453fc419fac5204e0a1bbb18f5293e69e4b2a62754eca8c61fd3353015d3e6ee944ee061dc651b42c33f4f5
-
SSDEEP
6144:KsnkSdQ6mCtnRPF9cCGr/uHkBV+UdvrEFp7hKwUrQ:KsnkinRNh4uHkBjvrEH7ZUrQ
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-