General
-
Target
e24eb364be8962b2b9e3dd667e1a2476235e0261054f6190069bd8dcbe3247b7N.exe
-
Size
1.1MB
-
Sample
250122-ytcfrasrfv
-
MD5
cc9cc7e7d773e5800669594c0c03ec00
-
SHA1
9421efdf48a1c428956668baab3c17a275f1c5c9
-
SHA256
e24eb364be8962b2b9e3dd667e1a2476235e0261054f6190069bd8dcbe3247b7
-
SHA512
d2fb15a414b22f13f2fc6da6965ab6d3165c6abf8b8004335055a4f8665aa30d0d0cf15304136b3772dee1895a8167a5ec0d89451b367cb371b0163befa8ef24
-
SSDEEP
24576:XWoLctDQhBamqpJ8bTzR0ZfzJYgcid68Ih44W3Di+6okcewMrEH7g:XWoLcxsgozOZfzCJ83Disb0
Static task
static1
Behavioral task
behavioral1
Sample
e24eb364be8962b2b9e3dd667e1a2476235e0261054f6190069bd8dcbe3247b7N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e24eb364be8962b2b9e3dd667e1a2476235e0261054f6190069bd8dcbe3247b7N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
e24eb364be8962b2b9e3dd667e1a2476235e0261054f6190069bd8dcbe3247b7N.exe
-
Size
1.1MB
-
MD5
cc9cc7e7d773e5800669594c0c03ec00
-
SHA1
9421efdf48a1c428956668baab3c17a275f1c5c9
-
SHA256
e24eb364be8962b2b9e3dd667e1a2476235e0261054f6190069bd8dcbe3247b7
-
SHA512
d2fb15a414b22f13f2fc6da6965ab6d3165c6abf8b8004335055a4f8665aa30d0d0cf15304136b3772dee1895a8167a5ec0d89451b367cb371b0163befa8ef24
-
SSDEEP
24576:XWoLctDQhBamqpJ8bTzR0ZfzJYgcid68Ih44W3Di+6okcewMrEH7g:XWoLcxsgozOZfzCJ83Disb0
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Event Triggered Execution: Image File Execution Options Injection
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
3AppInit DLLs
1Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
3AppInit DLLs
1Component Object Model Hijacking
1Image File Execution Options Injection
1