General
-
Target
bce48557251b32b6357ec787551aeb093639d76eec7041392f081a6263557ab9
-
Size
4.7MB
-
Sample
250121-hjgpqa1nbv
-
MD5
106fdf9240e53ab8541ee507da5fd695
-
SHA1
9a73f053d4b118176aee8072561f5aef19b14fe1
-
SHA256
bce48557251b32b6357ec787551aeb093639d76eec7041392f081a6263557ab9
-
SHA512
5643c10f3f190ab5d47a92f0676142bacd7b7cd3a651e570ca31fc3ea82087ce8c2df8c7f775627b71d26daf7a4285c6d8b79a2b8e0fcf9cef433cb4ca0f3e40
-
SSDEEP
98304:AmoPfJqXSceajGYpMCgQ/UxOETRl8XVtZyE:Ka4Kf8JTRVE
Static task
static1
Behavioral task
behavioral1
Sample
bce48557251b32b6357ec787551aeb093639d76eec7041392f081a6263557ab9.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
bce48557251b32b6357ec787551aeb093639d76eec7041392f081a6263557ab9
-
Size
4.7MB
-
MD5
106fdf9240e53ab8541ee507da5fd695
-
SHA1
9a73f053d4b118176aee8072561f5aef19b14fe1
-
SHA256
bce48557251b32b6357ec787551aeb093639d76eec7041392f081a6263557ab9
-
SHA512
5643c10f3f190ab5d47a92f0676142bacd7b7cd3a651e570ca31fc3ea82087ce8c2df8c7f775627b71d26daf7a4285c6d8b79a2b8e0fcf9cef433cb4ca0f3e40
-
SSDEEP
98304:AmoPfJqXSceajGYpMCgQ/UxOETRl8XVtZyE:Ka4Kf8JTRVE
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-