General

  • Target

    2024-07-10_5361b3cedd86c52c7eead816e964f4af_floxif_magniber

  • Size

    10.2MB

  • Sample

    240710-g7rzxstfje

  • MD5

    5361b3cedd86c52c7eead816e964f4af

  • SHA1

    b96b97e033c4fa7b198d79b38ba735f04cd749ba

  • SHA256

    d269700900bd2fadc7b2a2d733116e6f18b5b879d1a29bcf620093c40566cad3

  • SHA512

    b14cd054a1d0188d35ee3ac3643a53a861a9f2e394dcd32babf91d810f87bc1edfe4d6bc5a140906a944ad8194afcbc78213aa8c65b146fc1681be7a4e5e5f1b

  • SSDEEP

    196608:Jdad4T0xcsSB5orrcbSsi0s/lmPJ7N3VvXWrqufezvq7:/adCoXrlAJ7N3pXW2uGzy7

Malware Config

Targets

    • Target

      2024-07-10_5361b3cedd86c52c7eead816e964f4af_floxif_magniber

    • Size

      10.2MB

    • MD5

      5361b3cedd86c52c7eead816e964f4af

    • SHA1

      b96b97e033c4fa7b198d79b38ba735f04cd749ba

    • SHA256

      d269700900bd2fadc7b2a2d733116e6f18b5b879d1a29bcf620093c40566cad3

    • SHA512

      b14cd054a1d0188d35ee3ac3643a53a861a9f2e394dcd32babf91d810f87bc1edfe4d6bc5a140906a944ad8194afcbc78213aa8c65b146fc1681be7a4e5e5f1b

    • SSDEEP

      196608:Jdad4T0xcsSB5orrcbSsi0s/lmPJ7N3VvXWrqufezvq7:/adCoXrlAJ7N3pXW2uGzy7

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks