General
-
Target
80c0c84cc06b328e63c698bef176b1b6059233adfce7f8cad805b90f0631197d
-
Size
798KB
-
Sample
250109-dr2mmsylbp
-
MD5
4d2106caf8be29fba5710f35e8090f29
-
SHA1
f259d87a47078fdb70d3116539b831a8dbd0ca63
-
SHA256
80c0c84cc06b328e63c698bef176b1b6059233adfce7f8cad805b90f0631197d
-
SHA512
0fd15cb9e0523c9d9c3e44569820d633adff9286ae16139635e5e53a27473d71e551b288f0912316c7dbb74a223ffa89d1a56ab04a2657c0a0affa3e387a0a73
-
SSDEEP
12288:pemevewX8PKucaTljjJdTd3o5aUX7jzmBjvrEH7j:pengKucaTljjJdTaRjzwrEH7j
Static task
static1
Behavioral task
behavioral1
Sample
80c0c84cc06b328e63c698bef176b1b6059233adfce7f8cad805b90f0631197d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80c0c84cc06b328e63c698bef176b1b6059233adfce7f8cad805b90f0631197d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
80c0c84cc06b328e63c698bef176b1b6059233adfce7f8cad805b90f0631197d
-
Size
798KB
-
MD5
4d2106caf8be29fba5710f35e8090f29
-
SHA1
f259d87a47078fdb70d3116539b831a8dbd0ca63
-
SHA256
80c0c84cc06b328e63c698bef176b1b6059233adfce7f8cad805b90f0631197d
-
SHA512
0fd15cb9e0523c9d9c3e44569820d633adff9286ae16139635e5e53a27473d71e551b288f0912316c7dbb74a223ffa89d1a56ab04a2657c0a0affa3e387a0a73
-
SSDEEP
12288:pemevewX8PKucaTljjJdTd3o5aUX7jzmBjvrEH7j:pengKucaTljjJdTaRjzwrEH7j
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-