General

  • Target

    4686bae5d7fdd4d953ba7eefade8a31ef4b7bd0057273c876ee1c8697bd31a46

  • Size

    558KB

  • Sample

    241118-tg6rlsvmfk

  • MD5

    7fea8688212206c4a28dc21d6b178fba

  • SHA1

    c4b76bb85e92a4300e55608fc746ffd88d71493c

  • SHA256

    4686bae5d7fdd4d953ba7eefade8a31ef4b7bd0057273c876ee1c8697bd31a46

  • SHA512

    a57558df468e0b41e00a1e21ac8f57348f180469ac17c65c2a1b2ce573ee00c5e14f35eeb746229035b08a7d4ca4343e4229e9215dae4ca56ceb85acd696aecc

  • SSDEEP

    12288:KN58fsMMSsMMfBvMcsCMcs/FSaUFRFmALnqzwtG4cR1Mq5JIPMRGM4h/qof1:K/8fsMMSsMMfBvMcsCMcs/fUFRF3htj3

Malware Config

Targets

    • Target

      4686bae5d7fdd4d953ba7eefade8a31ef4b7bd0057273c876ee1c8697bd31a46

    • Size

      558KB

    • MD5

      7fea8688212206c4a28dc21d6b178fba

    • SHA1

      c4b76bb85e92a4300e55608fc746ffd88d71493c

    • SHA256

      4686bae5d7fdd4d953ba7eefade8a31ef4b7bd0057273c876ee1c8697bd31a46

    • SHA512

      a57558df468e0b41e00a1e21ac8f57348f180469ac17c65c2a1b2ce573ee00c5e14f35eeb746229035b08a7d4ca4343e4229e9215dae4ca56ceb85acd696aecc

    • SSDEEP

      12288:KN58fsMMSsMMfBvMcsCMcs/FSaUFRFmALnqzwtG4cR1Mq5JIPMRGM4h/qof1:K/8fsMMSsMMfBvMcsCMcs/fUFRF3htj3

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks