General
-
Target
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.exe
-
Size
163KB
-
Sample
250104-l13v3awqgn
-
MD5
27f76da4410dc3ca013cf6f4c4441880
-
SHA1
45d23109b5409152c3d8f2ec54b2a2f72dfd10ba
-
SHA256
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874c
-
SHA512
ea1fba057ec0c2c9cb9996cc832e26e430c7d24f72984ba9fa5b298f3915b19e8f95a7d2fd2b14bdf1ecd996bf0d608eaf97746b1db01a904a557ad42fa0841a
-
SSDEEP
3072:ryy9dPX0+CIZyTmPP56e5lmeqsQvVqRlkM4OAD/KLznBuB2JA2BjtSEJ1:rFd8+CIEGieqsQvMRlkM4RD/qzMfUhSk
Static task
static1
Behavioral task
behavioral1
Sample
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874cN.exe
-
Size
163KB
-
MD5
27f76da4410dc3ca013cf6f4c4441880
-
SHA1
45d23109b5409152c3d8f2ec54b2a2f72dfd10ba
-
SHA256
b99d6d0e0efee084431ee80b424709489e5e1acb0d56d025a66da7648a74874c
-
SHA512
ea1fba057ec0c2c9cb9996cc832e26e430c7d24f72984ba9fa5b298f3915b19e8f95a7d2fd2b14bdf1ecd996bf0d608eaf97746b1db01a904a557ad42fa0841a
-
SSDEEP
3072:ryy9dPX0+CIZyTmPP56e5lmeqsQvVqRlkM4OAD/KLznBuB2JA2BjtSEJ1:rFd8+CIEGieqsQvMRlkM4RD/qzMfUhSk
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-