General
-
Target
2025-01-10_f0036316bdc107de75dc3ecc67839d85_floxif_poet-rat_snatch
-
Size
16.2MB
-
Sample
250110-a4x87swmaw
-
MD5
f0036316bdc107de75dc3ecc67839d85
-
SHA1
69cf22017f5623474bb82a90c6902892ef272d0e
-
SHA256
1c1c01af84ef7537198243c0c66414a052a58862e597948ef228d38b120c6737
-
SHA512
3b88c22223d86af14e76406f028717f88a9cd4ab4930e32d1be3e2820579d3ea324af182b7f9bfb516901a2f0ab690e73193ce4aedd1ce47a6d533ba22e3f69f
-
SSDEEP
196608:CMBH+XFthlRfDUJakzZxeFRY2A25qCzBgxS+lKS4o:NYd4kCZYF62pg0+cS4o
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_f0036316bdc107de75dc3ecc67839d85_floxif_poet-rat_snatch.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-10_f0036316bdc107de75dc3ecc67839d85_floxif_poet-rat_snatch
-
Size
16.2MB
-
MD5
f0036316bdc107de75dc3ecc67839d85
-
SHA1
69cf22017f5623474bb82a90c6902892ef272d0e
-
SHA256
1c1c01af84ef7537198243c0c66414a052a58862e597948ef228d38b120c6737
-
SHA512
3b88c22223d86af14e76406f028717f88a9cd4ab4930e32d1be3e2820579d3ea324af182b7f9bfb516901a2f0ab690e73193ce4aedd1ce47a6d533ba22e3f69f
-
SSDEEP
196608:CMBH+XFthlRfDUJakzZxeFRY2A25qCzBgxS+lKS4o:NYd4kCZYF62pg0+cS4o
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-