General
-
Target
8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0
-
Size
808KB
-
Sample
250105-ct3gaazqdn
-
MD5
16b82725b35e1ce2c13e84d08017733e
-
SHA1
a263e643783efd9ad40f47e7e2edab9ce7d2b2c9
-
SHA256
8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0
-
SHA512
86752202c82f1e832a9fd9215c28db1618e2878d095a0ed9df55cbda231746f84f097eabc7063ef6738476a81ab13b4aa99e7f0cd9137c7ee69258c15dd3aa64
-
SSDEEP
12288:MJKC9XsK2SYNPG2Nl4ySBCGdo6hcXBW3CMYxHwALEQ2BjvrEH7V:LRPNl4yh8DhcXBW3CM4rgrEH7V
Static task
static1
Behavioral task
behavioral1
Sample
8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0
-
Size
808KB
-
MD5
16b82725b35e1ce2c13e84d08017733e
-
SHA1
a263e643783efd9ad40f47e7e2edab9ce7d2b2c9
-
SHA256
8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0
-
SHA512
86752202c82f1e832a9fd9215c28db1618e2878d095a0ed9df55cbda231746f84f097eabc7063ef6738476a81ab13b4aa99e7f0cd9137c7ee69258c15dd3aa64
-
SSDEEP
12288:MJKC9XsK2SYNPG2Nl4ySBCGdo6hcXBW3CMYxHwALEQ2BjvrEH7V:LRPNl4yh8DhcXBW3CM4rgrEH7V
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-