General
-
Target
992a04b12119fbead14c09739611e9211c7bd8884b4a01946acfc53340483a2a
-
Size
287KB
-
Sample
250121-jp4l4stnak
-
MD5
6189aa68853e37793ff54e4e4a87051c
-
SHA1
09bfbaecda4e73d097fc41da8ac4bb5e6fd89eea
-
SHA256
992a04b12119fbead14c09739611e9211c7bd8884b4a01946acfc53340483a2a
-
SHA512
95c5b4cddd71e89e7c2e7dcc98e35d4c9f40c0a12798899999567a7bd261c8bd5e5675f7df8a2e7636b932328af0fac2673ad1fe6357a32e4d3a565acbd72bb5
-
SSDEEP
6144:r0IfTJ1kHnuyXTZBB+R8WpMBV+UdvrEFp7hKo:r0IbJauyXTvB+R8WiBjvrEH7n
Static task
static1
Behavioral task
behavioral1
Sample
992a04b12119fbead14c09739611e9211c7bd8884b4a01946acfc53340483a2a.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
992a04b12119fbead14c09739611e9211c7bd8884b4a01946acfc53340483a2a
-
Size
287KB
-
MD5
6189aa68853e37793ff54e4e4a87051c
-
SHA1
09bfbaecda4e73d097fc41da8ac4bb5e6fd89eea
-
SHA256
992a04b12119fbead14c09739611e9211c7bd8884b4a01946acfc53340483a2a
-
SHA512
95c5b4cddd71e89e7c2e7dcc98e35d4c9f40c0a12798899999567a7bd261c8bd5e5675f7df8a2e7636b932328af0fac2673ad1fe6357a32e4d3a565acbd72bb5
-
SSDEEP
6144:r0IfTJ1kHnuyXTZBB+R8WpMBV+UdvrEFp7hKo:r0IbJauyXTvB+R8WiBjvrEH7n
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-