General

  • Target

    09ffbeecf61eaa93ab37833f6b1c0430N.exe

  • Size

    209KB

  • Sample

    240708-1pcxtsshng

  • MD5

    09ffbeecf61eaa93ab37833f6b1c0430

  • SHA1

    0522e0556207422e8aea0ef9b2a2e1f1bda64bfb

  • SHA256

    866bdba016657801637c10e53724538d4b9d2cb86429d1e82a8451312ea51250

  • SHA512

    79e4f07fe2471564893b209ba9661d3c661269cf7b9a65f4a015dbe51bdea478c20394943c3a91bdbffdfedd94b27acdc6c5daaab145da3cf5d2e1dc91b90a25

  • SSDEEP

    3072:CZx8gJscD1UnU+JZoutueXlCJQ33f8PfJA+R4NvVwFmrtBj7:w2As81UnUEoSZnU3JAEwVwUrTn

Malware Config

Targets

    • Target

      09ffbeecf61eaa93ab37833f6b1c0430N.exe

    • Size

      209KB

    • MD5

      09ffbeecf61eaa93ab37833f6b1c0430

    • SHA1

      0522e0556207422e8aea0ef9b2a2e1f1bda64bfb

    • SHA256

      866bdba016657801637c10e53724538d4b9d2cb86429d1e82a8451312ea51250

    • SHA512

      79e4f07fe2471564893b209ba9661d3c661269cf7b9a65f4a015dbe51bdea478c20394943c3a91bdbffdfedd94b27acdc6c5daaab145da3cf5d2e1dc91b90a25

    • SSDEEP

      3072:CZx8gJscD1UnU+JZoutueXlCJQ33f8PfJA+R4NvVwFmrtBj7:w2As81UnUEoSZnU3JAEwVwUrTn

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • UAC bypass

    • Windows security bypass

    • Detects Floxif payload

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks