General

  • Target

    012f46926d91912079e08dd99e3ccaf19a9c765263e12260c9bcae7ade1bba21

  • Size

    155KB

  • Sample

    241119-xslglazgmd

  • MD5

    8dcea4af0de3d51feae5eab07cda5c94

  • SHA1

    a7578029a4861755a076c85fa67daa764597c8d7

  • SHA256

    012f46926d91912079e08dd99e3ccaf19a9c765263e12260c9bcae7ade1bba21

  • SHA512

    3ae01b5ed648c4127eb2ed6ac7662f2edaffb92b67fae3ccb232f835a1804a7cb230c55509b468828c64513ef3c134d6ee28ef048881c823d223add485193b65

  • SSDEEP

    3072:gXngq+/eifZgC8/7OYsuN7bj2lQBV+UdE+rECWp7hKDL:4gq+/BfY/7OYsebnBV+UdvrEFp7hKX

Malware Config

Targets

    • Target

      012f46926d91912079e08dd99e3ccaf19a9c765263e12260c9bcae7ade1bba21

    • Size

      155KB

    • MD5

      8dcea4af0de3d51feae5eab07cda5c94

    • SHA1

      a7578029a4861755a076c85fa67daa764597c8d7

    • SHA256

      012f46926d91912079e08dd99e3ccaf19a9c765263e12260c9bcae7ade1bba21

    • SHA512

      3ae01b5ed648c4127eb2ed6ac7662f2edaffb92b67fae3ccb232f835a1804a7cb230c55509b468828c64513ef3c134d6ee28ef048881c823d223add485193b65

    • SSDEEP

      3072:gXngq+/eifZgC8/7OYsuN7bj2lQBV+UdE+rECWp7hKDL:4gq+/BfY/7OYsebnBV+UdvrEFp7hKX

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks