General

  • Target

    0d0a3297ea958c93950571bd2850e00d99c95d39c272031588803acf33a34c71N

  • Size

    616KB

  • Sample

    241018-myyc8swajq

  • MD5

    6db3c3b315a338687bdfb5a6e307e3e0

  • SHA1

    ebd07d20371df3c23794bcd33dd2fdac38ccb418

  • SHA256

    0d0a3297ea958c93950571bd2850e00d99c95d39c272031588803acf33a34c71

  • SHA512

    131bc9cfeba6c2a9556c73066b724b5a94a5ee3ea3293ba32ba2f8db42b441e16d7615f88b41441ea54a94df5a0c3ed4ba917bf3c551eaba2122314254c2eb25

  • SSDEEP

    6144:Chs4dodcOaOdFGkdJSuskkkkknffCp5CrRKluaqQHqPK2BV+UdvrEFp7hK3:4s4dodfaOdI0SEqzqhBjvrEH7o

Malware Config

Targets

    • Target

      0d0a3297ea958c93950571bd2850e00d99c95d39c272031588803acf33a34c71N

    • Size

      616KB

    • MD5

      6db3c3b315a338687bdfb5a6e307e3e0

    • SHA1

      ebd07d20371df3c23794bcd33dd2fdac38ccb418

    • SHA256

      0d0a3297ea958c93950571bd2850e00d99c95d39c272031588803acf33a34c71

    • SHA512

      131bc9cfeba6c2a9556c73066b724b5a94a5ee3ea3293ba32ba2f8db42b441e16d7615f88b41441ea54a94df5a0c3ed4ba917bf3c551eaba2122314254c2eb25

    • SSDEEP

      6144:Chs4dodcOaOdFGkdJSuskkkkknffCp5CrRKluaqQHqPK2BV+UdvrEFp7hK3:4s4dodfaOdI0SEqzqhBjvrEH7o

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks