General
-
Target
fd095d94dab5744d80f2960a586aa1e1495e3271b120cfa86b5436c4e980a03aN.exe
-
Size
2.2MB
-
Sample
250207-2rvfbssjaw
-
MD5
438a2acff4d6bd9100274cc161bbb8a0
-
SHA1
632db2da116a54bf62d600f390ce8d09d5c75ae0
-
SHA256
fd095d94dab5744d80f2960a586aa1e1495e3271b120cfa86b5436c4e980a03a
-
SHA512
edeadfc4cb6ee532f6db478feeb5b8180ae09f8aeb194b4502d7b513bba5182de1f67d7a4ecc4a1d31d968d16cf0023a3e10a457e41133f6fce928d7eb01196e
-
SSDEEP
49152:hLAbwDQpJHhS+oprPjnFEfxAdxk9gOh0n8F:lA5JtcPJEfxAoh0nO
Static task
static1
Behavioral task
behavioral1
Sample
fd095d94dab5744d80f2960a586aa1e1495e3271b120cfa86b5436c4e980a03aN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fd095d94dab5744d80f2960a586aa1e1495e3271b120cfa86b5436c4e980a03aN.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
fd095d94dab5744d80f2960a586aa1e1495e3271b120cfa86b5436c4e980a03aN.exe
-
Size
2.2MB
-
MD5
438a2acff4d6bd9100274cc161bbb8a0
-
SHA1
632db2da116a54bf62d600f390ce8d09d5c75ae0
-
SHA256
fd095d94dab5744d80f2960a586aa1e1495e3271b120cfa86b5436c4e980a03a
-
SHA512
edeadfc4cb6ee532f6db478feeb5b8180ae09f8aeb194b4502d7b513bba5182de1f67d7a4ecc4a1d31d968d16cf0023a3e10a457e41133f6fce928d7eb01196e
-
SSDEEP
49152:hLAbwDQpJHhS+oprPjnFEfxAdxk9gOh0n8F:lA5JtcPJEfxAoh0nO
-
Floxif family
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1