General
-
Target
2025-02-03_f80debbeb8e081757a6580fa15e7b6fe_floxif_frostygoop_snatch
-
Size
3.6MB
-
Sample
250203-f4savatldl
-
MD5
f80debbeb8e081757a6580fa15e7b6fe
-
SHA1
cb572659876833ccc893050fda92e1c9484c476d
-
SHA256
9fcbb5d1d7b549ccbe72771e9da7ac8afb5c2477ae510249e90ef39f4793887c
-
SHA512
79e6207ca46ed991e9cf23725dfce25160e10a18b2850d4ed6b6c652cac0d42d1ec5cec6156eb9e1976dea9c809e72b9f5c524d784414994e068b9d5096909a1
-
SSDEEP
49152:VRK2Y1IKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZXW:zK2npyEme4fOTwq2iOLkQmm
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_f80debbeb8e081757a6580fa15e7b6fe_floxif_frostygoop_snatch.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-03_f80debbeb8e081757a6580fa15e7b6fe_floxif_frostygoop_snatch
-
Size
3.6MB
-
MD5
f80debbeb8e081757a6580fa15e7b6fe
-
SHA1
cb572659876833ccc893050fda92e1c9484c476d
-
SHA256
9fcbb5d1d7b549ccbe72771e9da7ac8afb5c2477ae510249e90ef39f4793887c
-
SHA512
79e6207ca46ed991e9cf23725dfce25160e10a18b2850d4ed6b6c652cac0d42d1ec5cec6156eb9e1976dea9c809e72b9f5c524d784414994e068b9d5096909a1
-
SSDEEP
49152:VRK2Y1IKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZXW:zK2npyEme4fOTwq2iOLkQmm
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-