General
-
Target
7151027d2704c1dde48d26fc6ae3889fba55b5c6a868d83f855292259eeb6679
-
Size
224KB
-
Sample
250208-cghw4syqfz
-
MD5
d62503412d42d55fb39349d4cb5a1b82
-
SHA1
a32d1ade5f7c6003b484c33a69c725761e506f78
-
SHA256
7151027d2704c1dde48d26fc6ae3889fba55b5c6a868d83f855292259eeb6679
-
SHA512
1ad0283d7d0fc169c2e8eec9d04316355bc06bf76b95231a05bbbf0fefef549e322a7fe69c322e249d21e0d794dbce4aad3cd9d6d70d76a0f890bde5a26647b6
-
SSDEEP
6144:ayR2zi7ajvRcGLKZHHxw9hH4JdBV+UdvrEFp7hK4UN:ayR2zi+jvy29hH4JdBjvrEH78N
Static task
static1
Behavioral task
behavioral1
Sample
7151027d2704c1dde48d26fc6ae3889fba55b5c6a868d83f855292259eeb6679.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
7151027d2704c1dde48d26fc6ae3889fba55b5c6a868d83f855292259eeb6679
-
Size
224KB
-
MD5
d62503412d42d55fb39349d4cb5a1b82
-
SHA1
a32d1ade5f7c6003b484c33a69c725761e506f78
-
SHA256
7151027d2704c1dde48d26fc6ae3889fba55b5c6a868d83f855292259eeb6679
-
SHA512
1ad0283d7d0fc169c2e8eec9d04316355bc06bf76b95231a05bbbf0fefef549e322a7fe69c322e249d21e0d794dbce4aad3cd9d6d70d76a0f890bde5a26647b6
-
SSDEEP
6144:ayR2zi7ajvRcGLKZHHxw9hH4JdBV+UdvrEFp7hK4UN:ayR2zi+jvy29hH4JdBjvrEH78N
-
Floxif family
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-