General
-
Target
a39c2aa6146aa3b1b7c7c0bec61348fc0a3344c797eacbee326bc8eb64e5d169
-
Size
565KB
-
Sample
250111-ewhk1atkdv
-
MD5
c2bb6bb55c6c22e802fe319c58fc72cf
-
SHA1
a3c7d894649ddc3562fc54fcee53a773fd286337
-
SHA256
a39c2aa6146aa3b1b7c7c0bec61348fc0a3344c797eacbee326bc8eb64e5d169
-
SHA512
4cd69f39cc9c8e3bd2a367a124bba2b0f5009905544b77c848a6fbc3924351f8197ac7961872fb1eac123576e66f379d21a2e176ed9d3d7dbabaf1c9ea3fd2df
-
SSDEEP
12288:+chgdFkOdJe4E3btouLNviw5PbIwZ9hhvVHh1ZuLKnB/dKVQwBjvrEH7XZ:76FZa3btoWviwFv9XVBC2/uprEH7p
Static task
static1
Behavioral task
behavioral1
Sample
a39c2aa6146aa3b1b7c7c0bec61348fc0a3344c797eacbee326bc8eb64e5d169.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
a39c2aa6146aa3b1b7c7c0bec61348fc0a3344c797eacbee326bc8eb64e5d169.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
a39c2aa6146aa3b1b7c7c0bec61348fc0a3344c797eacbee326bc8eb64e5d169
-
Size
565KB
-
MD5
c2bb6bb55c6c22e802fe319c58fc72cf
-
SHA1
a3c7d894649ddc3562fc54fcee53a773fd286337
-
SHA256
a39c2aa6146aa3b1b7c7c0bec61348fc0a3344c797eacbee326bc8eb64e5d169
-
SHA512
4cd69f39cc9c8e3bd2a367a124bba2b0f5009905544b77c848a6fbc3924351f8197ac7961872fb1eac123576e66f379d21a2e176ed9d3d7dbabaf1c9ea3fd2df
-
SSDEEP
12288:+chgdFkOdJe4E3btouLNviw5PbIwZ9hhvVHh1ZuLKnB/dKVQwBjvrEH7XZ:76FZa3btoWviwFv9XVBC2/uprEH7p
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1