General
-
Target
2025-02-01_b9af782acad0207e66a38e5c11c68deb_floxif_frostygoop_snatch
-
Size
9.1MB
-
Sample
250201-nm4xbaskfj
-
MD5
b9af782acad0207e66a38e5c11c68deb
-
SHA1
1c828cb4005fa5b0cca6c1ab661164e9cbab32a8
-
SHA256
53282ae113b357c84ecfaf638a2d5d8b61df3db3361a23fd02dcf0061f23e346
-
SHA512
1944c344d74149c09bedd6f8589596a1d58399654194a2112cbf15f31951d17f1386b162ac1272c9e833f6b47f78d5596fe7aff92d862d47e398bbd7d22fcf92
-
SSDEEP
98304:zzkE/+HZe0A3yA3smOdUzbM0pBtTNus9N2ALWyWuLazn:BeZxAieHM0hTvuoJCn
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-01_b9af782acad0207e66a38e5c11c68deb_floxif_frostygoop_snatch.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-01_b9af782acad0207e66a38e5c11c68deb_floxif_frostygoop_snatch
-
Size
9.1MB
-
MD5
b9af782acad0207e66a38e5c11c68deb
-
SHA1
1c828cb4005fa5b0cca6c1ab661164e9cbab32a8
-
SHA256
53282ae113b357c84ecfaf638a2d5d8b61df3db3361a23fd02dcf0061f23e346
-
SHA512
1944c344d74149c09bedd6f8589596a1d58399654194a2112cbf15f31951d17f1386b162ac1272c9e833f6b47f78d5596fe7aff92d862d47e398bbd7d22fcf92
-
SSDEEP
98304:zzkE/+HZe0A3yA3smOdUzbM0pBtTNus9N2ALWyWuLazn:BeZxAieHM0hTvuoJCn
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-