General

  • Target

    9a004b70ef289585fb214024566b6a60df15e6b7241912508e7d3940834918b8

  • Size

    369KB

  • Sample

    241121-cng86axdqa

  • MD5

    a2b97eed6b504aae208c60d6f1d6102f

  • SHA1

    105e070068a63fbb0afa9a8640618381be69b6f2

  • SHA256

    9a004b70ef289585fb214024566b6a60df15e6b7241912508e7d3940834918b8

  • SHA512

    cd1d85f1d09fa64bf84da8576ffa9b5408961d6438b5916a9048ebfe0c809a96fcf7088b8e150b3e4ec30341973f5cec8d13f5c6a0d38e42dff259bad5aafead

  • SSDEEP

    6144:IeWE8faaQMbjFtVNtHb7RGb/Mp7mgypysDVpU2drVxdBV+UdvrEFp7hKw4E+:ItaaQMXDFFfp7S5DbU2RdBjvrEH7oE+

Malware Config

Targets

    • Target

      9a004b70ef289585fb214024566b6a60df15e6b7241912508e7d3940834918b8

    • Size

      369KB

    • MD5

      a2b97eed6b504aae208c60d6f1d6102f

    • SHA1

      105e070068a63fbb0afa9a8640618381be69b6f2

    • SHA256

      9a004b70ef289585fb214024566b6a60df15e6b7241912508e7d3940834918b8

    • SHA512

      cd1d85f1d09fa64bf84da8576ffa9b5408961d6438b5916a9048ebfe0c809a96fcf7088b8e150b3e4ec30341973f5cec8d13f5c6a0d38e42dff259bad5aafead

    • SSDEEP

      6144:IeWE8faaQMbjFtVNtHb7RGb/Mp7mgypysDVpU2drVxdBV+UdvrEFp7hKw4E+:ItaaQMXDFFfp7S5DbU2RdBjvrEH7oE+

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks