General
-
Target
522bfbeaf30dc7bce70f5dd131b2e1e98aa36d9d8d78a235272fb38c8e0aac33N.exe
-
Size
1.1MB
-
Sample
250104-qlg29stkfm
-
MD5
986204782f9c42adcda132b75bc1ac20
-
SHA1
efa42c260bcaf0b4331343744dafaebf06a4736f
-
SHA256
522bfbeaf30dc7bce70f5dd131b2e1e98aa36d9d8d78a235272fb38c8e0aac33
-
SHA512
e71a31e1b63dfac1df99020dd2ba1661186be70d81005465a1d4723cd5d0d7316df24a9221d95f61ca8ea26a2885a0933d33cb0de1e405c43a344d0eff061804
-
SSDEEP
24576:cAvyPuCv0p2XJqwPM+Xvk4jtSyDEA8akOmPOvSn6IjreIafOP7EuOTqrEH7q:Textko18ioyDq/ObWe7fA7Ec
Behavioral task
behavioral1
Sample
522bfbeaf30dc7bce70f5dd131b2e1e98aa36d9d8d78a235272fb38c8e0aac33N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
522bfbeaf30dc7bce70f5dd131b2e1e98aa36d9d8d78a235272fb38c8e0aac33N.exe
-
Size
1.1MB
-
MD5
986204782f9c42adcda132b75bc1ac20
-
SHA1
efa42c260bcaf0b4331343744dafaebf06a4736f
-
SHA256
522bfbeaf30dc7bce70f5dd131b2e1e98aa36d9d8d78a235272fb38c8e0aac33
-
SHA512
e71a31e1b63dfac1df99020dd2ba1661186be70d81005465a1d4723cd5d0d7316df24a9221d95f61ca8ea26a2885a0933d33cb0de1e405c43a344d0eff061804
-
SSDEEP
24576:cAvyPuCv0p2XJqwPM+Xvk4jtSyDEA8akOmPOvSn6IjreIafOP7EuOTqrEH7q:Textko18ioyDq/ObWe7fA7Ec
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-