General
-
Target
039e5182d4af083e50346d81f8e7e504260ff53e12e3c99cdcc4ac99c38e9533
-
Size
1.5MB
-
Sample
250120-r1syratqhr
-
MD5
c557e7884b09fd5a8a8bbcb1336901d0
-
SHA1
75c8d892320d04e5df36936d13a3617c41eb2e0e
-
SHA256
039e5182d4af083e50346d81f8e7e504260ff53e12e3c99cdcc4ac99c38e9533
-
SHA512
a730e9abb3ac21770a007cb8b04e909e26b294317b912eac92fb2b2b7776b62b3cc8e5142892f3658513b9d8638fd5b49b6c69fb551f73e76500314685e0387d
-
SSDEEP
24576:B/WD+nDKdmWr4qt9voQ7ayJ1UNeZ5ZTyXOmScQ3mWn+6CirkN46LG/LP3nrEH70:++nDsmWMqt9AmZ20D+6S3LOfF
Static task
static1
Behavioral task
behavioral1
Sample
039e5182d4af083e50346d81f8e7e504260ff53e12e3c99cdcc4ac99c38e9533.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
039e5182d4af083e50346d81f8e7e504260ff53e12e3c99cdcc4ac99c38e9533.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
039e5182d4af083e50346d81f8e7e504260ff53e12e3c99cdcc4ac99c38e9533
-
Size
1.5MB
-
MD5
c557e7884b09fd5a8a8bbcb1336901d0
-
SHA1
75c8d892320d04e5df36936d13a3617c41eb2e0e
-
SHA256
039e5182d4af083e50346d81f8e7e504260ff53e12e3c99cdcc4ac99c38e9533
-
SHA512
a730e9abb3ac21770a007cb8b04e909e26b294317b912eac92fb2b2b7776b62b3cc8e5142892f3658513b9d8638fd5b49b6c69fb551f73e76500314685e0387d
-
SSDEEP
24576:B/WD+nDKdmWr4qt9voQ7ayJ1UNeZ5ZTyXOmScQ3mWn+6CirkN46LG/LP3nrEH70:++nDsmWMqt9AmZ20D+6S3LOfF
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-