General
-
Target
c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813N.exe
-
Size
465KB
-
Sample
250127-cxdbkaxkcj
-
MD5
f8f8d20ae5c995f33152c842bdb8df00
-
SHA1
72343889935efe5c1c14793bbbcd17484a8f71d0
-
SHA256
c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813
-
SHA512
698991065dbc03125c34e8c6ffb25d20bdd86b5f00017f89d0c719142382d1f3da2028d17e498994c5bcdb0e0a1853dde8a6802a507990c089d7f44ea31b2ae2
-
SSDEEP
12288:5uJusUSao21YTG3+kLKiLFpjxNWBjvrEH7eMy:5uc4ao21AdkeSFpdarEH7Xy
Static task
static1
Behavioral task
behavioral1
Sample
c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813N.exe
-
Size
465KB
-
MD5
f8f8d20ae5c995f33152c842bdb8df00
-
SHA1
72343889935efe5c1c14793bbbcd17484a8f71d0
-
SHA256
c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813
-
SHA512
698991065dbc03125c34e8c6ffb25d20bdd86b5f00017f89d0c719142382d1f3da2028d17e498994c5bcdb0e0a1853dde8a6802a507990c089d7f44ea31b2ae2
-
SSDEEP
12288:5uJusUSao21YTG3+kLKiLFpjxNWBjvrEH7eMy:5uc4ao21AdkeSFpdarEH7Xy
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-