General
-
Target
2025-02-05_584a984096f4edc6f6b77696113056d9_floxif_frostygoop_snatch
-
Size
3.6MB
-
Sample
250205-meqt2stnbp
-
MD5
584a984096f4edc6f6b77696113056d9
-
SHA1
88740600187eed66a3ad2001c4afe7b6cb4d87ca
-
SHA256
a240d561064b0cc24b1fef4729e504081fc709319c0e831e905e43ceabb4eab5
-
SHA512
329999ea3504d12814b1d4a3a2ad5ebfc4798c963e292b33daa0b8d143baae584eec31d491a571ab5eb44abcfbe194f5419e7505eeee5a17e21dea3c3d9efb83
-
SSDEEP
49152:VRs2FpIKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZ0:zs2MpyEme4fOTwq2iOLkQm0
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-05_584a984096f4edc6f6b77696113056d9_floxif_frostygoop_snatch.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-02-05_584a984096f4edc6f6b77696113056d9_floxif_frostygoop_snatch.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
2025-02-05_584a984096f4edc6f6b77696113056d9_floxif_frostygoop_snatch
-
Size
3.6MB
-
MD5
584a984096f4edc6f6b77696113056d9
-
SHA1
88740600187eed66a3ad2001c4afe7b6cb4d87ca
-
SHA256
a240d561064b0cc24b1fef4729e504081fc709319c0e831e905e43ceabb4eab5
-
SHA512
329999ea3504d12814b1d4a3a2ad5ebfc4798c963e292b33daa0b8d143baae584eec31d491a571ab5eb44abcfbe194f5419e7505eeee5a17e21dea3c3d9efb83
-
SSDEEP
49152:VRs2FpIKqvQtRWme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZ0:zs2MpyEme4fOTwq2iOLkQm0
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-