General
-
Target
9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262N.exe
-
Size
465KB
-
Sample
250122-yxtt7stran
-
MD5
96f1a1263c9b621cc8b4157805724de0
-
SHA1
e0f34401554d74b453784356ba6386155223d986
-
SHA256
9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262
-
SHA512
42ab902124017753722fff19295f2a936c34180386b6103b42d98297dbf95afded865639a701cc82745f532f77818b7b32c4c175a3f6f94459911919c87529cb
-
SSDEEP
12288:5uJusUSao217d8jG3+kUjKiLFpxxNWBjvrEH7U0:5uc4ao21udklSFpbarEH7U0
Static task
static1
Behavioral task
behavioral1
Sample
9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262N.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262N.exe
-
Size
465KB
-
MD5
96f1a1263c9b621cc8b4157805724de0
-
SHA1
e0f34401554d74b453784356ba6386155223d986
-
SHA256
9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262
-
SHA512
42ab902124017753722fff19295f2a936c34180386b6103b42d98297dbf95afded865639a701cc82745f532f77818b7b32c4c175a3f6f94459911919c87529cb
-
SSDEEP
12288:5uJusUSao217d8jG3+kUjKiLFpxxNWBjvrEH7U0:5uc4ao21udklSFpbarEH7U0
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-