General
-
Target
3b277b3d9abc86e72decb611eccbcd42c7536cdcb7c89440e3f2b9f6691fb711N.exe
-
Size
213KB
-
Sample
250108-ptq5gazmfw
-
MD5
3da112ee50413e5fd2c96602e894fe80
-
SHA1
c2f8c7d47cad2edb4aec72e30078b1c5d03e134a
-
SHA256
3b277b3d9abc86e72decb611eccbcd42c7536cdcb7c89440e3f2b9f6691fb711
-
SHA512
9d2365ba3e8b906dab45d09422e0e622757db2fc5f2c4e4ff512f6a23a20921fd516f1b81b7a761d0b112e949b7d0f3a2508178ef62d1dd6f2a71fa9b6540ed7
-
SSDEEP
6144:0gYQdQ6mCtnRPF9cCGr/uHkBV+UdvrEFp7hKppL:0gYInRNh4uHkBjvrEH7epL
Static task
static1
Behavioral task
behavioral1
Sample
3b277b3d9abc86e72decb611eccbcd42c7536cdcb7c89440e3f2b9f6691fb711N.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
3b277b3d9abc86e72decb611eccbcd42c7536cdcb7c89440e3f2b9f6691fb711N.exe
-
Size
213KB
-
MD5
3da112ee50413e5fd2c96602e894fe80
-
SHA1
c2f8c7d47cad2edb4aec72e30078b1c5d03e134a
-
SHA256
3b277b3d9abc86e72decb611eccbcd42c7536cdcb7c89440e3f2b9f6691fb711
-
SHA512
9d2365ba3e8b906dab45d09422e0e622757db2fc5f2c4e4ff512f6a23a20921fd516f1b81b7a761d0b112e949b7d0f3a2508178ef62d1dd6f2a71fa9b6540ed7
-
SSDEEP
6144:0gYQdQ6mCtnRPF9cCGr/uHkBV+UdvrEFp7hKppL:0gYInRNh4uHkBjvrEH7epL
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-