General
-
Target
37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3N.exe
-
Size
884KB
-
Sample
250104-pwjs6szkgt
-
MD5
a8272a4e210192fbfb8a5140673d0af0
-
SHA1
79feef12c88e9ba5d93f9b30b5e704249cb8d853
-
SHA256
37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3
-
SHA512
2004e76f1c3053765129ea4863e992334c313ff530cea3ac8e201b9511e5951514164a86dcdd9fc6328badf9ed89de333902a1aa2ca68a31d6101f15b7a483a3
-
SSDEEP
24576:XXAhvvPPHMQCwrK7NUCDZnmiS7/4zNMjrEH7z4:g9zCw+7Nl1na7/0yV
Behavioral task
behavioral1
Sample
37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3N.exe
-
Size
884KB
-
MD5
a8272a4e210192fbfb8a5140673d0af0
-
SHA1
79feef12c88e9ba5d93f9b30b5e704249cb8d853
-
SHA256
37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3
-
SHA512
2004e76f1c3053765129ea4863e992334c313ff530cea3ac8e201b9511e5951514164a86dcdd9fc6328badf9ed89de333902a1aa2ca68a31d6101f15b7a483a3
-
SSDEEP
24576:XXAhvvPPHMQCwrK7NUCDZnmiS7/4zNMjrEH7z4:g9zCw+7Nl1na7/0yV
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-