General
-
Target
09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba
-
Size
313KB
-
Sample
250104-yctzgawjgq
-
MD5
3e23d56e5ced25d69b67735acb9ec044
-
SHA1
68b4163fade128741c2954579c5b2bc5ca17b6c2
-
SHA256
09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba
-
SHA512
4570b509f66b67c1b1b234d66415456435040c2b6992aa8c0359c47ac984f245be72007f5739f56c0c11beabe69f3a6091821869f4fbf7da372216653d77fb2b
-
SSDEEP
6144:UsLqdufVUNDaPxdk1cWQRNTBSNBV+UdvrEFp7hKjKp1:PFUNDaPQv0NT0NBjvrEH7+8
Static task
static1
Behavioral task
behavioral1
Sample
09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba
-
Size
313KB
-
MD5
3e23d56e5ced25d69b67735acb9ec044
-
SHA1
68b4163fade128741c2954579c5b2bc5ca17b6c2
-
SHA256
09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba
-
SHA512
4570b509f66b67c1b1b234d66415456435040c2b6992aa8c0359c47ac984f245be72007f5739f56c0c11beabe69f3a6091821869f4fbf7da372216653d77fb2b
-
SSDEEP
6144:UsLqdufVUNDaPxdk1cWQRNTBSNBV+UdvrEFp7hKjKp1:PFUNDaPQv0NT0NBjvrEH7+8
-
Floxif family
-
Modifies security service
-
Modifies visiblity of hidden/system files in Explorer
-
Detects Floxif payload
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
5