General

  • Target

    cb09f7ffec971ddb4ba07cd6a709a300N.exe

  • Size

    955KB

  • Sample

    240721-ql2fxasbqg

  • MD5

    cb09f7ffec971ddb4ba07cd6a709a300

  • SHA1

    931dec03f5e8dbb76916ca1b231206ab66ce5423

  • SHA256

    6ad7c80f9d53385c56d47c295208a642c8d890ba33b20711a40e0272c1e6eb4c

  • SHA512

    94c402dcc7bffcc525cc897f3173c4c78737a92ab0dcdf0dbe85cb83c0c7c6856fc17c93085bb3d13e3b193041bb0f3d7fddd46dab9d1bcf39340ec2f673c338

  • SSDEEP

    24576:wr37G4Tr6g4rCvwHIo2WEyMz7yYK6ZSmd9saBpAnVFpMrEH7s7:wyLrCvPxzvbsgUFY

Malware Config

Targets

    • Target

      cb09f7ffec971ddb4ba07cd6a709a300N.exe

    • Size

      955KB

    • MD5

      cb09f7ffec971ddb4ba07cd6a709a300

    • SHA1

      931dec03f5e8dbb76916ca1b231206ab66ce5423

    • SHA256

      6ad7c80f9d53385c56d47c295208a642c8d890ba33b20711a40e0272c1e6eb4c

    • SHA512

      94c402dcc7bffcc525cc897f3173c4c78737a92ab0dcdf0dbe85cb83c0c7c6856fc17c93085bb3d13e3b193041bb0f3d7fddd46dab9d1bcf39340ec2f673c338

    • SSDEEP

      24576:wr37G4Tr6g4rCvwHIo2WEyMz7yYK6ZSmd9saBpAnVFpMrEH7s7:wyLrCvPxzvbsgUFY

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks