General
-
Target
b491e64a90be61339f918dc6d9c454bb3e281dabdd4334954dccd48a054ca8ca
-
Size
220KB
-
Sample
250330-tp2gvsstex
-
MD5
708fd3dd5377b586aaf8d1db7d5c48f6
-
SHA1
93b47424f2b9ae45dd8ac2a86cc732aea828694e
-
SHA256
b491e64a90be61339f918dc6d9c454bb3e281dabdd4334954dccd48a054ca8ca
-
SHA512
e1200f3477623f0b5f282fd4294c8210f68c5f0e9bf3af8dcd390908a7c0bada5f77062d580928f52dd50682ca91649a22d533cb3b48febee196559747a525b0
-
SSDEEP
3072:oNlZ2YBOZV9ERu9/N6+lRiE19SnnQOohy/8oQQ4BD2lQBV+UdE+rECWp7hKsV:o1DqfN6gHRVQ4RBV+UdvrEFp7hKa
Static task
static1
Behavioral task
behavioral1
Sample
b491e64a90be61339f918dc6d9c454bb3e281dabdd4334954dccd48a054ca8ca.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b491e64a90be61339f918dc6d9c454bb3e281dabdd4334954dccd48a054ca8ca.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
b491e64a90be61339f918dc6d9c454bb3e281dabdd4334954dccd48a054ca8ca
-
Size
220KB
-
MD5
708fd3dd5377b586aaf8d1db7d5c48f6
-
SHA1
93b47424f2b9ae45dd8ac2a86cc732aea828694e
-
SHA256
b491e64a90be61339f918dc6d9c454bb3e281dabdd4334954dccd48a054ca8ca
-
SHA512
e1200f3477623f0b5f282fd4294c8210f68c5f0e9bf3af8dcd390908a7c0bada5f77062d580928f52dd50682ca91649a22d533cb3b48febee196559747a525b0
-
SSDEEP
3072:oNlZ2YBOZV9ERu9/N6+lRiE19SnnQOohy/8oQQ4BD2lQBV+UdE+rECWp7hKsV:o1DqfN6gHRVQ4RBV+UdvrEFp7hKa
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-