General

  • Target

    96764bb749c7a48d0bcbe10420a5601853fc4f3c7a5b088aec1d350b5ec9f8f3

  • Size

    229KB

  • Sample

    241210-gz8mps1lfk

  • MD5

    01f1c68e5b496373e4678db84c17b07d

  • SHA1

    b201e113b5a27a93d64938de37b4bfba183580a9

  • SHA256

    96764bb749c7a48d0bcbe10420a5601853fc4f3c7a5b088aec1d350b5ec9f8f3

  • SHA512

    1a236f4f9ef4171b7480adf3f7a618e84c650cc3370e547a88640b6419483f419985818f5af0443ba08e321a69dd62d245161c1b9d684995daac250977e24a58

  • SSDEEP

    3072:UAt2SmlpmUyiTOZQvfSERdX9Zk8AtB+alonPCHwiVSj5j2VR0d54yVIyO5hpGb/q:CTmCjRsB+BP/BV+UdvrEFp7hKfUVq8

Malware Config

Targets

    • Target

      96764bb749c7a48d0bcbe10420a5601853fc4f3c7a5b088aec1d350b5ec9f8f3

    • Size

      229KB

    • MD5

      01f1c68e5b496373e4678db84c17b07d

    • SHA1

      b201e113b5a27a93d64938de37b4bfba183580a9

    • SHA256

      96764bb749c7a48d0bcbe10420a5601853fc4f3c7a5b088aec1d350b5ec9f8f3

    • SHA512

      1a236f4f9ef4171b7480adf3f7a618e84c650cc3370e547a88640b6419483f419985818f5af0443ba08e321a69dd62d245161c1b9d684995daac250977e24a58

    • SSDEEP

      3072:UAt2SmlpmUyiTOZQvfSERdX9Zk8AtB+alonPCHwiVSj5j2VR0d54yVIyO5hpGb/q:CTmCjRsB+BP/BV+UdvrEFp7hKfUVq8

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks