General

  • Target

    c8fc8f99794379d32df845807d1458226909c1f5b0802705771fc1b0cfbcac53N

  • Size

    2.6MB

  • Sample

    240930-a5j3zashqe

  • MD5

    9ffe5ec8fe89b00e2a2a4da8ff613c80

  • SHA1

    773478af0772501be2c0ea6ec8fec496c1e93b43

  • SHA256

    c8fc8f99794379d32df845807d1458226909c1f5b0802705771fc1b0cfbcac53

  • SHA512

    6a81e19baa22a3b1360c0a76bef74f0153f4afd9906fd4f0e0af651d0ae9c6ca9c8fb83994bb8d71134b37282bd29defd386af2539e9dbf51b3706e778c70983

  • SSDEEP

    49152:zE5ZT77/MV2zS9U7fQnpB+24TkjMn4UcnHM0q7iTdveR20GXRUKiU049WY10hmNw:MTvS9U7fKpB+wjM49Hpq7iTdGkrXRUKE

Malware Config

Targets

    • Target

      c8fc8f99794379d32df845807d1458226909c1f5b0802705771fc1b0cfbcac53N

    • Size

      2.6MB

    • MD5

      9ffe5ec8fe89b00e2a2a4da8ff613c80

    • SHA1

      773478af0772501be2c0ea6ec8fec496c1e93b43

    • SHA256

      c8fc8f99794379d32df845807d1458226909c1f5b0802705771fc1b0cfbcac53

    • SHA512

      6a81e19baa22a3b1360c0a76bef74f0153f4afd9906fd4f0e0af651d0ae9c6ca9c8fb83994bb8d71134b37282bd29defd386af2539e9dbf51b3706e778c70983

    • SSDEEP

      49152:zE5ZT77/MV2zS9U7fQnpB+24TkjMn4UcnHM0q7iTdveR20GXRUKiU049WY10hmNw:MTvS9U7fKpB+wjM49Hpq7iTdGkrXRUKE

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks