General

  • Target

    231d6735655bb03a3369611c9ab3826b126b0850882c12ca01048bb291bd5048

  • Size

    286KB

  • Sample

    241210-fvphlavkfs

  • MD5

    32c959409a7e7f48cda1d52fac498842

  • SHA1

    12af7b2d29eaef749e41e64aa424b427988d8000

  • SHA256

    231d6735655bb03a3369611c9ab3826b126b0850882c12ca01048bb291bd5048

  • SHA512

    9d2c639ee172234902cf3bade570798a4c2586c8f7a5578850561110ef3e57ba801951be2c37795290a80ce7ee17a5916b4192a3cf6d9bca8a355eead81ee662

  • SSDEEP

    6144:q7gKNkhSR/1WuyXnZhB+h8WHlBV+UdvrEFp7hKs:q7gKNkhm/1WuyXnPB+h8WHlBjvrEH7v

Malware Config

Targets

    • Target

      231d6735655bb03a3369611c9ab3826b126b0850882c12ca01048bb291bd5048

    • Size

      286KB

    • MD5

      32c959409a7e7f48cda1d52fac498842

    • SHA1

      12af7b2d29eaef749e41e64aa424b427988d8000

    • SHA256

      231d6735655bb03a3369611c9ab3826b126b0850882c12ca01048bb291bd5048

    • SHA512

      9d2c639ee172234902cf3bade570798a4c2586c8f7a5578850561110ef3e57ba801951be2c37795290a80ce7ee17a5916b4192a3cf6d9bca8a355eead81ee662

    • SSDEEP

      6144:q7gKNkhSR/1WuyXnZhB+h8WHlBV+UdvrEFp7hKs:q7gKNkhm/1WuyXnPB+h8WHlBjvrEH7v

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks