General

  • Target

    57e5d7acc80f11481ff46b41ba870167aaac118c74a937567d6b5e1b63965c37N

  • Size

    4.0MB

  • Sample

    241008-3j8tesydrp

  • MD5

    a40f2758745b892c53a1dd1471b272c0

  • SHA1

    295a6cd02e81144ec2712ccef78dc0fcea67f8c0

  • SHA256

    57e5d7acc80f11481ff46b41ba870167aaac118c74a937567d6b5e1b63965c37

  • SHA512

    9dfbb23c4d99f1a0435f356331764dcf6344da9dc37885a1e2aa80130ac0f51e196d1258de6fe32242932153c24ab7fceefbf87de56ae1fc78c67745fed14ec9

  • SSDEEP

    49152:2L4EbUvI5jL53soP+DaOVvC8HIARyHqinLMTPfuQ1TAvO/HGzQkQSdan:2L4ufsLvqAkH7LMruQSyHlkQSc

Malware Config

Targets

    • Target

      57e5d7acc80f11481ff46b41ba870167aaac118c74a937567d6b5e1b63965c37N

    • Size

      4.0MB

    • MD5

      a40f2758745b892c53a1dd1471b272c0

    • SHA1

      295a6cd02e81144ec2712ccef78dc0fcea67f8c0

    • SHA256

      57e5d7acc80f11481ff46b41ba870167aaac118c74a937567d6b5e1b63965c37

    • SHA512

      9dfbb23c4d99f1a0435f356331764dcf6344da9dc37885a1e2aa80130ac0f51e196d1258de6fe32242932153c24ab7fceefbf87de56ae1fc78c67745fed14ec9

    • SSDEEP

      49152:2L4EbUvI5jL53soP+DaOVvC8HIARyHqinLMTPfuQ1TAvO/HGzQkQSdan:2L4ufsLvqAkH7LMruQSyHlkQSc

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks