General
-
Target
536026f46f7ba150fbf6ee9eb3f113374724f3b40ab0cce8621965a478a8399a
-
Size
1.8MB
-
Sample
250204-2mnrzsxper
-
MD5
8b0327270e49de6e9809a8e906c3cd87
-
SHA1
9fd80b8b12823db569b58872da52015962582008
-
SHA256
536026f46f7ba150fbf6ee9eb3f113374724f3b40ab0cce8621965a478a8399a
-
SHA512
67d09ac11abef79e942eca0e319547c94d69afacfb408c19427d32934c38bd8f4e842d9c46bae729e3eba2405dbbe336be8b5952eafe0f204b0360bb9b38ef0d
-
SSDEEP
49152:mSRFWpiINDnQOklug56b5KEZccMqR2Odpc9hlc9pjDgO/rF9sSV2RA:mwWpiINnGll6b5KEO5qR9dp4c9pQO/rl
Static task
static1
Behavioral task
behavioral1
Sample
536026f46f7ba150fbf6ee9eb3f113374724f3b40ab0cce8621965a478a8399a.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
536026f46f7ba150fbf6ee9eb3f113374724f3b40ab0cce8621965a478a8399a
-
Size
1.8MB
-
MD5
8b0327270e49de6e9809a8e906c3cd87
-
SHA1
9fd80b8b12823db569b58872da52015962582008
-
SHA256
536026f46f7ba150fbf6ee9eb3f113374724f3b40ab0cce8621965a478a8399a
-
SHA512
67d09ac11abef79e942eca0e319547c94d69afacfb408c19427d32934c38bd8f4e842d9c46bae729e3eba2405dbbe336be8b5952eafe0f204b0360bb9b38ef0d
-
SSDEEP
49152:mSRFWpiINDnQOklug56b5KEZccMqR2Odpc9hlc9pjDgO/rF9sSV2RA:mwWpiINnGll6b5KEO5qR9dp4c9pQO/rl
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-