General
-
Target
6727f86995e11ec408b0eac6070e18a6b05bf2f05a23083708e88abeec1ede73N.exe
-
Size
1.2MB
-
Sample
250127-h81twsxnct
-
MD5
323ea8cc09d9be8405514cd757de5860
-
SHA1
1fe287da28b788399acac089fc92ba07c66dfc8b
-
SHA256
6727f86995e11ec408b0eac6070e18a6b05bf2f05a23083708e88abeec1ede73
-
SHA512
76960cfb24bb585bdb75665d802103fb9c5fb51eb9b55da539f1189449d9ce569f338c27df2ada042fc420c90d0eb6c8afca2b3f900b96a2ce1566e7d6774f3e
-
SSDEEP
24576:dEVdgQ7b9Kj+/mKy33/Hf/5MotosWWRs64tSiMDMRKNGCWrEH7J:EvbEj+xg/HfiXKs2iMDMn+
Static task
static1
Behavioral task
behavioral1
Sample
6727f86995e11ec408b0eac6070e18a6b05bf2f05a23083708e88abeec1ede73N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6727f86995e11ec408b0eac6070e18a6b05bf2f05a23083708e88abeec1ede73N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6727f86995e11ec408b0eac6070e18a6b05bf2f05a23083708e88abeec1ede73N.exe
-
Size
1.2MB
-
MD5
323ea8cc09d9be8405514cd757de5860
-
SHA1
1fe287da28b788399acac089fc92ba07c66dfc8b
-
SHA256
6727f86995e11ec408b0eac6070e18a6b05bf2f05a23083708e88abeec1ede73
-
SHA512
76960cfb24bb585bdb75665d802103fb9c5fb51eb9b55da539f1189449d9ce569f338c27df2ada042fc420c90d0eb6c8afca2b3f900b96a2ce1566e7d6774f3e
-
SSDEEP
24576:dEVdgQ7b9Kj+/mKy33/Hf/5MotosWWRs64tSiMDMRKNGCWrEH7J:EvbEj+xg/HfiXKs2iMDMn+
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-