General

  • Target

    7bce9acb638aee7ccb7405bd13292ebbf9861f39ee0145474e0628b47eab2d64

  • Size

    286KB

  • Sample

    241212-gzrn7asrex

  • MD5

    44cadd7aaa40ad855a0894db2928a54b

  • SHA1

    aed59359cda06c41ab7fbad5dfa5519169dfc29c

  • SHA256

    7bce9acb638aee7ccb7405bd13292ebbf9861f39ee0145474e0628b47eab2d64

  • SHA512

    d934279d870677a88060eb07b0cc468024f750f3280b71451785cea54f3bdb5dfc328900eb1a1ee27a297752d6607109d82d4f8971252b163691d5498c55a8aa

  • SSDEEP

    6144:W7gKN125kHouyXnZhB+h8WHlBV+UdvrEFp7hKDL:W7gKN12JuyXnPB+h8WHlBjvrEH7IL

Malware Config

Targets

    • Target

      7bce9acb638aee7ccb7405bd13292ebbf9861f39ee0145474e0628b47eab2d64

    • Size

      286KB

    • MD5

      44cadd7aaa40ad855a0894db2928a54b

    • SHA1

      aed59359cda06c41ab7fbad5dfa5519169dfc29c

    • SHA256

      7bce9acb638aee7ccb7405bd13292ebbf9861f39ee0145474e0628b47eab2d64

    • SHA512

      d934279d870677a88060eb07b0cc468024f750f3280b71451785cea54f3bdb5dfc328900eb1a1ee27a297752d6607109d82d4f8971252b163691d5498c55a8aa

    • SSDEEP

      6144:W7gKN125kHouyXnZhB+h8WHlBV+UdvrEFp7hKDL:W7gKN12JuyXnPB+h8WHlBjvrEH7IL

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks