General
-
Target
2025-04-24_91d5df926b6b5c4b22e199cab44afb32_elex_floxif_poet-rat_sliver_snatch
-
Size
8.7MB
-
Sample
250424-vdvevaxyfy
-
MD5
91d5df926b6b5c4b22e199cab44afb32
-
SHA1
33d16146c1b7f09f26a0f19179fce44fe1db0161
-
SHA256
a1b8eb8fdbbf4e8a0940b5e574e23d5d034f3f32bc07202ab3b34c2ab2b21421
-
SHA512
842ffdde63f6b8a5555a26361ebaa8e0e9085fea0284c7ad069543ac5dd8dd42631df917fd4951f38df05bc7fef33c00dce047b33e99693ec6c3172adbd44051
-
SSDEEP
98304:zvn2TfhLyWbvVqGwz1CVCKE2CavuugvEYvHlnr9wXfd:zvn+hLy4Vnwz1CVCKZCjv1e
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-24_91d5df926b6b5c4b22e199cab44afb32_elex_floxif_poet-rat_sliver_snatch.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
2025-04-24_91d5df926b6b5c4b22e199cab44afb32_elex_floxif_poet-rat_sliver_snatch.exe
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
2025-04-24_91d5df926b6b5c4b22e199cab44afb32_elex_floxif_poet-rat_sliver_snatch
-
Size
8.7MB
-
MD5
91d5df926b6b5c4b22e199cab44afb32
-
SHA1
33d16146c1b7f09f26a0f19179fce44fe1db0161
-
SHA256
a1b8eb8fdbbf4e8a0940b5e574e23d5d034f3f32bc07202ab3b34c2ab2b21421
-
SHA512
842ffdde63f6b8a5555a26361ebaa8e0e9085fea0284c7ad069543ac5dd8dd42631df917fd4951f38df05bc7fef33c00dce047b33e99693ec6c3172adbd44051
-
SSDEEP
98304:zvn2TfhLyWbvVqGwz1CVCKE2CavuugvEYvHlnr9wXfd:zvn+hLy4Vnwz1CVCKZCjv1e
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-