General
-
Target
1b844f77e317a362842de1b6c07e5191bcad3ba35ee04c4afcf35f0b121af7c0
-
Size
1.4MB
-
Sample
250107-zmwfqaxrav
-
MD5
b95988ee566d0919b96b6a90a4e23e54
-
SHA1
44482baa12867e942fdec25c08bfd4316a105d73
-
SHA256
1b844f77e317a362842de1b6c07e5191bcad3ba35ee04c4afcf35f0b121af7c0
-
SHA512
17047aa77243578eb52ccba57a98c4726aa1acd561af477b9b9e92af58d2d0f9739e9ed87fd79d311a3108660a266290039e8f12809d1338c439077dec957006
-
SSDEEP
24576:ok8KJ4SrOlppYW0avlLWjD7fEYbYJm6KjOsBJy348D0MtkHF4eFgalMC/QnrtJQa:YKDWpP0OWDwYMJmh7a48D0qpeOC/sQEp
Static task
static1
Behavioral task
behavioral1
Sample
1b844f77e317a362842de1b6c07e5191bcad3ba35ee04c4afcf35f0b121af7c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1b844f77e317a362842de1b6c07e5191bcad3ba35ee04c4afcf35f0b121af7c0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1b844f77e317a362842de1b6c07e5191bcad3ba35ee04c4afcf35f0b121af7c0
-
Size
1.4MB
-
MD5
b95988ee566d0919b96b6a90a4e23e54
-
SHA1
44482baa12867e942fdec25c08bfd4316a105d73
-
SHA256
1b844f77e317a362842de1b6c07e5191bcad3ba35ee04c4afcf35f0b121af7c0
-
SHA512
17047aa77243578eb52ccba57a98c4726aa1acd561af477b9b9e92af58d2d0f9739e9ed87fd79d311a3108660a266290039e8f12809d1338c439077dec957006
-
SSDEEP
24576:ok8KJ4SrOlppYW0avlLWjD7fEYbYJm6KjOsBJy348D0MtkHF4eFgalMC/QnrtJQa:YKDWpP0OWDwYMJmh7a48D0qpeOC/sQEp
-
Floxif family
-
Detects Floxif payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Event Triggered Execution: Image File Execution Options Injection
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1