General

  • Target

    2024-09-13_cc6f199a6f24d777c2c7bd7c1d72de39_bkransomware_floxif

  • Size

    2.3MB

  • Sample

    240913-qsz7essekr

  • MD5

    cc6f199a6f24d777c2c7bd7c1d72de39

  • SHA1

    bfe10a90fb92d37bf2f32a911cf64c289dbe1e50

  • SHA256

    6762027dd091793e85a117a814dcefceccbb2f762c8c6c8f0f67f8c2152d4b83

  • SHA512

    3bb8db434092d11de6dfde4ca9d2e3c377378d45e85f6569430b048dcb58a818dc30b0c2c585a1e79e34a680c8911f2095ae68f8073b5e2f00a5b59192508bc3

  • SSDEEP

    49152:1g4/fb0T3hlfNIbJy1m3a2bhwM1BPP2q0qzlB/8zIaySwzKXFr7fJv5t:bfEh9NIdy1BEwMjuq0qzlB/kIaySOKXD

Malware Config

Targets

    • Target

      2024-09-13_cc6f199a6f24d777c2c7bd7c1d72de39_bkransomware_floxif

    • Size

      2.3MB

    • MD5

      cc6f199a6f24d777c2c7bd7c1d72de39

    • SHA1

      bfe10a90fb92d37bf2f32a911cf64c289dbe1e50

    • SHA256

      6762027dd091793e85a117a814dcefceccbb2f762c8c6c8f0f67f8c2152d4b83

    • SHA512

      3bb8db434092d11de6dfde4ca9d2e3c377378d45e85f6569430b048dcb58a818dc30b0c2c585a1e79e34a680c8911f2095ae68f8073b5e2f00a5b59192508bc3

    • SSDEEP

      49152:1g4/fb0T3hlfNIbJy1m3a2bhwM1BPP2q0qzlB/8zIaySwzKXFr7fJv5t:bfEh9NIdy1BEwMjuq0qzlB/kIaySOKXD

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks