General
-
Target
99644ad8ca66b7c19d6ee1d7e0e6d2beec9db834bfb2377257672fb2bdc760c8N.exe
-
Size
371KB
-
Sample
250108-az4v7ayjfk
-
MD5
5ac2fd767a98de79013b2c31d6ecea70
-
SHA1
2ce015f764e413eb33cd43e31b6eb2016f3b9cb8
-
SHA256
99644ad8ca66b7c19d6ee1d7e0e6d2beec9db834bfb2377257672fb2bdc760c8
-
SHA512
e1582c94fac748b12eb31cf48bb97e5b4e48012be0142ac499d0a680bf94ba351b59a7f3f0b248bb839bf1e0a691844a950216e05f9520ea3c316a1e43ad09e6
-
SSDEEP
6144:Q1dbEi+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59CIHBV+UdvrEFp7hKU:QjQjrEN249AyE/rbaMct4bO2/VhBjvri
Behavioral task
behavioral1
Sample
99644ad8ca66b7c19d6ee1d7e0e6d2beec9db834bfb2377257672fb2bdc760c8N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
99644ad8ca66b7c19d6ee1d7e0e6d2beec9db834bfb2377257672fb2bdc760c8N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
99644ad8ca66b7c19d6ee1d7e0e6d2beec9db834bfb2377257672fb2bdc760c8N.exe
-
Size
371KB
-
MD5
5ac2fd767a98de79013b2c31d6ecea70
-
SHA1
2ce015f764e413eb33cd43e31b6eb2016f3b9cb8
-
SHA256
99644ad8ca66b7c19d6ee1d7e0e6d2beec9db834bfb2377257672fb2bdc760c8
-
SHA512
e1582c94fac748b12eb31cf48bb97e5b4e48012be0142ac499d0a680bf94ba351b59a7f3f0b248bb839bf1e0a691844a950216e05f9520ea3c316a1e43ad09e6
-
SSDEEP
6144:Q1dbEi+rEg024fpLZazEjvE/rbay19tSt4bO2BaDmeBJe59CIHBV+UdvrEFp7hKU:QjQjrEN249AyE/rbaMct4bO2/VhBjvri
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-