General

  • Target

    b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec

  • Size

    2.7MB

  • Sample

    241119-wwlq4azbnc

  • MD5

    814b6ea832d866cc73f6eac4beea5ce2

  • SHA1

    f150c9b039752b59da7fc344f5031ac9c530fdd8

  • SHA256

    b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec

  • SHA512

    49224842515e4a02db6560dab38c866f56cb3b3e378a3dc34d6715f7c02c7259f9bf91ce4109fe20d9a0f10efe814b8d6e260837eb04c8c84857b53a06d43e34

  • SSDEEP

    49152:/FJi+7OytIt34Ehz1XdggLOkJAwYzlbFky7CYVmyoZEhaTnMtSYXkNg1:/FJi+ayqVdggLBAjln7CymyougMdn

Malware Config

Targets

    • Target

      b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec

    • Size

      2.7MB

    • MD5

      814b6ea832d866cc73f6eac4beea5ce2

    • SHA1

      f150c9b039752b59da7fc344f5031ac9c530fdd8

    • SHA256

      b75764783acc03c3386e2c27a58f2629be2ffecdc04bb4a0e2570672c0005aec

    • SHA512

      49224842515e4a02db6560dab38c866f56cb3b3e378a3dc34d6715f7c02c7259f9bf91ce4109fe20d9a0f10efe814b8d6e260837eb04c8c84857b53a06d43e34

    • SSDEEP

      49152:/FJi+7OytIt34Ehz1XdggLOkJAwYzlbFky7CYVmyoZEhaTnMtSYXkNg1:/FJi+ayqVdggLBAjln7CymyougMdn

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks