General
-
Target
25cce06d304be9da9d07f30e7fffc3d911a49e1e9b7114aab96ef4dcb7b16e02
-
Size
527KB
-
Sample
250125-zn7kdazlcv
-
MD5
8789dc877736fffdd456c368bb2d853e
-
SHA1
bd2edba5842368db2de86d51314f70c9a3a2f344
-
SHA256
25cce06d304be9da9d07f30e7fffc3d911a49e1e9b7114aab96ef4dcb7b16e02
-
SHA512
ab0510e2834339bae437c155342189140528f196d4ff35b54004675b79d1c09c8694116be11b099d86b4871b60a28e9d45bc9df453b9758d4aec0202e6500f54
-
SSDEEP
12288:yXcHH3lY2vrGRjgCFIOOH5q1b8C9tmRWAABjvrEH7db:ysHVY2r4gCFIL0rPmtirEH7V
Static task
static1
Behavioral task
behavioral1
Sample
25cce06d304be9da9d07f30e7fffc3d911a49e1e9b7114aab96ef4dcb7b16e02.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
25cce06d304be9da9d07f30e7fffc3d911a49e1e9b7114aab96ef4dcb7b16e02
-
Size
527KB
-
MD5
8789dc877736fffdd456c368bb2d853e
-
SHA1
bd2edba5842368db2de86d51314f70c9a3a2f344
-
SHA256
25cce06d304be9da9d07f30e7fffc3d911a49e1e9b7114aab96ef4dcb7b16e02
-
SHA512
ab0510e2834339bae437c155342189140528f196d4ff35b54004675b79d1c09c8694116be11b099d86b4871b60a28e9d45bc9df453b9758d4aec0202e6500f54
-
SSDEEP
12288:yXcHH3lY2vrGRjgCFIOOH5q1b8C9tmRWAABjvrEH7db:ysHVY2r4gCFIL0rPmtirEH7V
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-