General
-
Target
49f252be89f34dad17eb7922ba268faf723d3e5f99559cfcd7e4c19499e51c6c
-
Size
278KB
-
Sample
250111-hbz64aypby
-
MD5
7fd8fbab489b3420aa573faf040a5533
-
SHA1
09b79c84bda1cd64cfed216a95611d4797056a5c
-
SHA256
49f252be89f34dad17eb7922ba268faf723d3e5f99559cfcd7e4c19499e51c6c
-
SHA512
516c4c27b99e168ebc54b1dae7da057fc22c50fff6eca62fef0f8667bc5b11a7b4fb78bb4f26b4c7ade9d93ebdf2953e22bcba51ccfedbed8e6f26333a319a93
-
SSDEEP
6144:drhl/DFf3VRC3as7B+WCHBV+UdvrEFp7hKjN:drhlbFf3VLaB+WCHBjvrEH7UN
Static task
static1
Behavioral task
behavioral1
Sample
49f252be89f34dad17eb7922ba268faf723d3e5f99559cfcd7e4c19499e51c6c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
49f252be89f34dad17eb7922ba268faf723d3e5f99559cfcd7e4c19499e51c6c.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
49f252be89f34dad17eb7922ba268faf723d3e5f99559cfcd7e4c19499e51c6c
-
Size
278KB
-
MD5
7fd8fbab489b3420aa573faf040a5533
-
SHA1
09b79c84bda1cd64cfed216a95611d4797056a5c
-
SHA256
49f252be89f34dad17eb7922ba268faf723d3e5f99559cfcd7e4c19499e51c6c
-
SHA512
516c4c27b99e168ebc54b1dae7da057fc22c50fff6eca62fef0f8667bc5b11a7b4fb78bb4f26b4c7ade9d93ebdf2953e22bcba51ccfedbed8e6f26333a319a93
-
SSDEEP
6144:drhl/DFf3VRC3as7B+WCHBV+UdvrEFp7hKjN:drhlbFf3VLaB+WCHBjvrEH7UN
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-