General

  • Target

    f1b587fa51e2d88a9e92bede36ca1670N.exe

  • Size

    3.1MB

  • Sample

    240725-yrv53s1fqm

  • MD5

    f1b587fa51e2d88a9e92bede36ca1670

  • SHA1

    73854733f78120078dcf39c6297e673686b5370b

  • SHA256

    fbc433380780c3ffe0b8baa553c7dacd7315e26b18671785322f2507df30edf7

  • SHA512

    5841a51dde5e5be184aed26ac8dc668023e9772aa3cb266652ba1cc79e54e4b79d984687a3bbd8c7169dc33df63bd673086f5f2db3df17b755be04480182157c

  • SSDEEP

    49152:Y1oaD7iKzUfjpNG4h7iuxTc7RDpK7WkAbJa5OUmCmIZDgNWT30UNJqu1ZOWXx:inCG4h7FiRA7WkAbJ9rCmIZDjNJpD

Malware Config

Targets

    • Target

      f1b587fa51e2d88a9e92bede36ca1670N.exe

    • Size

      3.1MB

    • MD5

      f1b587fa51e2d88a9e92bede36ca1670

    • SHA1

      73854733f78120078dcf39c6297e673686b5370b

    • SHA256

      fbc433380780c3ffe0b8baa553c7dacd7315e26b18671785322f2507df30edf7

    • SHA512

      5841a51dde5e5be184aed26ac8dc668023e9772aa3cb266652ba1cc79e54e4b79d984687a3bbd8c7169dc33df63bd673086f5f2db3df17b755be04480182157c

    • SSDEEP

      49152:Y1oaD7iKzUfjpNG4h7iuxTc7RDpK7WkAbJa5OUmCmIZDgNWT30UNJqu1ZOWXx:inCG4h7FiRA7WkAbJ9rCmIZDjNJpD

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks