General

  • Target

    c1b7ff04a522733b335ceda9a661c8ca008fa2d09af0c250e392377b9f3c9fb5

  • Size

    3.1MB

  • Sample

    241118-sc54vaymfx

  • MD5

    94054b8de1e7fa37415798819e716071

  • SHA1

    b040e24c692e2b8aba3cdf389506e0212cd07fe1

  • SHA256

    c1b7ff04a522733b335ceda9a661c8ca008fa2d09af0c250e392377b9f3c9fb5

  • SHA512

    70742084275d726ad46801d1fb011dc446bab58083d1efb6cfdaeb8a00d5274c67da32e481cdcbd7aa11c5b194bec07572a37f4ff3d26269719e6a6b1593c2c3

  • SSDEEP

    49152:uRsEmhSuQ5GZ8CmguY1FFdFB4l3PLKYPhogpjFy69fffGz:uR5mhHQ5GqsuiFFdFBpcoSW

Malware Config

Targets

    • Target

      c1b7ff04a522733b335ceda9a661c8ca008fa2d09af0c250e392377b9f3c9fb5

    • Size

      3.1MB

    • MD5

      94054b8de1e7fa37415798819e716071

    • SHA1

      b040e24c692e2b8aba3cdf389506e0212cd07fe1

    • SHA256

      c1b7ff04a522733b335ceda9a661c8ca008fa2d09af0c250e392377b9f3c9fb5

    • SHA512

      70742084275d726ad46801d1fb011dc446bab58083d1efb6cfdaeb8a00d5274c67da32e481cdcbd7aa11c5b194bec07572a37f4ff3d26269719e6a6b1593c2c3

    • SSDEEP

      49152:uRsEmhSuQ5GZ8CmguY1FFdFB4l3PLKYPhogpjFy69fffGz:uR5mhHQ5GqsuiFFdFBpcoSW

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks