General
-
Target
2025-02-03_9c246cb66574029c57a7bdfc39e8eeff_floxif_poet-rat_snatch
-
Size
16.2MB
-
Sample
250203-arhmzstkcs
-
MD5
9c246cb66574029c57a7bdfc39e8eeff
-
SHA1
fca90afe0f72c92e5783b951078d5e06f249abe3
-
SHA256
7147201cf116a3edf04f55428fe102fc0aad08ba78d0bb8a7a78ed98083ee496
-
SHA512
c4f540edb56ca773944421e7d024202519b05243712c8858515b5e12ebbd6bbe9d2efbe8483ee8671e90eff6d83de6d9123a8ea2fbe2dc0bdeb0103a95df7df9
-
SSDEEP
196608:vMBH+PqthlRfDUJakzZxeFRY2A25qCzBgxS+lKS4E:CEG4kCZYF62pg0+cS4E
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_9c246cb66574029c57a7bdfc39e8eeff_floxif_poet-rat_snatch.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-02-03_9c246cb66574029c57a7bdfc39e8eeff_floxif_poet-rat_snatch
-
Size
16.2MB
-
MD5
9c246cb66574029c57a7bdfc39e8eeff
-
SHA1
fca90afe0f72c92e5783b951078d5e06f249abe3
-
SHA256
7147201cf116a3edf04f55428fe102fc0aad08ba78d0bb8a7a78ed98083ee496
-
SHA512
c4f540edb56ca773944421e7d024202519b05243712c8858515b5e12ebbd6bbe9d2efbe8483ee8671e90eff6d83de6d9123a8ea2fbe2dc0bdeb0103a95df7df9
-
SSDEEP
196608:vMBH+PqthlRfDUJakzZxeFRY2A25qCzBgxS+lKS4E:CEG4kCZYF62pg0+cS4E
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-