General

  • Target

    b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47dN

  • Size

    2.0MB

  • Sample

    241004-pmywqstern

  • MD5

    97e2e07e1f93bd0f06a54350d2714460

  • SHA1

    04e2e77b99841e7a75f6bc689e8868ef7e35fcb6

  • SHA256

    b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47d

  • SHA512

    a439c3595bae89de8c99b966add104913ccf502733fa3bdb3e03ebb550c21258a7bcb64081d12372f19c063d78e3cc6a51afc33cecd9b6c43d220063647dc3b0

  • SSDEEP

    49152:jio6pWgAw3G+ZDYolW9Y3OqkWXNc3lxF9LLPOAtBZ8rIy1cgD5jHmcS:jApWIGOTW9Y3OqkWXNc3lxFTtH8rIy1U

Malware Config

Targets

    • Target

      b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47dN

    • Size

      2.0MB

    • MD5

      97e2e07e1f93bd0f06a54350d2714460

    • SHA1

      04e2e77b99841e7a75f6bc689e8868ef7e35fcb6

    • SHA256

      b4e3528da2cd5d3bdfdb5764c35a524780759c7d7cb1a5ee22e9351e9e36d47d

    • SHA512

      a439c3595bae89de8c99b966add104913ccf502733fa3bdb3e03ebb550c21258a7bcb64081d12372f19c063d78e3cc6a51afc33cecd9b6c43d220063647dc3b0

    • SSDEEP

      49152:jio6pWgAw3G+ZDYolW9Y3OqkWXNc3lxF9LLPOAtBZ8rIy1cgD5jHmcS:jApWIGOTW9Y3OqkWXNc3lxFTtH8rIy1U

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks