General
-
Target
8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9aN.exe
-
Size
114KB
-
Sample
250119-yvvcystqhr
-
MD5
cc26122da6d0bf10d9da2255237c6da0
-
SHA1
07e38362aa8a166d89f7cf2566b9680165041848
-
SHA256
8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9a
-
SHA512
dd6e42fbe355ff8d4302920ab56b0e870618302986f25cbc42acae90163ea5810e284447611f17c95a2163275a9efb70f697690fa8cc9cbaae213abf5676e4a3
-
SSDEEP
1536:UpO1EksQRjv9qxgfOt2B8YQaXTRtLK+3STKx+3Py0KZGqNC03f3sdAymXFzgt1fu:UksQRfPpQuF4BOoTjcIDiFC1fIf
Static task
static1
Behavioral task
behavioral1
Sample
8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9aN.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9aN.exe
-
Size
114KB
-
MD5
cc26122da6d0bf10d9da2255237c6da0
-
SHA1
07e38362aa8a166d89f7cf2566b9680165041848
-
SHA256
8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9a
-
SHA512
dd6e42fbe355ff8d4302920ab56b0e870618302986f25cbc42acae90163ea5810e284447611f17c95a2163275a9efb70f697690fa8cc9cbaae213abf5676e4a3
-
SSDEEP
1536:UpO1EksQRjv9qxgfOt2B8YQaXTRtLK+3STKx+3Py0KZGqNC03f3sdAymXFzgt1fu:UksQRfPpQuF4BOoTjcIDiFC1fIf
-
Floxif family
-
Modifies WinLogon for persistence
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Detects Floxif payload
-
Disables RegEdit via registry modification
-
Event Triggered Execution: Image File Execution Options Injection
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1