General

  • Target

    17e5e41f962516b0e3bd6a7cd40eeca80a64fd2a3ce5b262008f76ed3ec6918e

  • Size

    169KB

  • Sample

    241120-zamm2stcmq

  • MD5

    de67266dbce1a35b430e05711be55a16

  • SHA1

    901ab7d385d2c31614fd033621c6594478ad2449

  • SHA256

    17e5e41f962516b0e3bd6a7cd40eeca80a64fd2a3ce5b262008f76ed3ec6918e

  • SHA512

    f04fd8117e08bb9c4ca8157fcf03efe25e7aa508dafa9e853b12bf7a0ff8966ef967074e905659796c28bc464a50fe7e91b68adab7ade7e4b528e5b6fd879e89

  • SSDEEP

    3072:/MxIfi7eGI+/oCc2lQBV+UdE+rECWp7hKpnQo:/bivBx6BV+UdvrEFp7hKp/

Malware Config

Targets

    • Target

      17e5e41f962516b0e3bd6a7cd40eeca80a64fd2a3ce5b262008f76ed3ec6918e

    • Size

      169KB

    • MD5

      de67266dbce1a35b430e05711be55a16

    • SHA1

      901ab7d385d2c31614fd033621c6594478ad2449

    • SHA256

      17e5e41f962516b0e3bd6a7cd40eeca80a64fd2a3ce5b262008f76ed3ec6918e

    • SHA512

      f04fd8117e08bb9c4ca8157fcf03efe25e7aa508dafa9e853b12bf7a0ff8966ef967074e905659796c28bc464a50fe7e91b68adab7ade7e4b528e5b6fd879e89

    • SSDEEP

      3072:/MxIfi7eGI+/oCc2lQBV+UdE+rECWp7hKpnQo:/bivBx6BV+UdvrEFp7hKp/

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks