General

  • Target

    372dce651e424b00ec9f8ee7fd77a6032201d5712e8b169ac3c635a818d6a94c

  • Size

    234KB

  • Sample

    241212-gzsaqasrez

  • MD5

    4b9fa527f9bbb43560ac79ce3fe8a114

  • SHA1

    188a10575bcc8b678722be387f55b8d311aea05e

  • SHA256

    372dce651e424b00ec9f8ee7fd77a6032201d5712e8b169ac3c635a818d6a94c

  • SHA512

    e153b92ededafd4aabca1e59b944c7d3248169337286bc59a5e5597339a092ff4754e0dfd96cb45b958140f2882cc7a5451c6d9580bae14badc6f26849df47ed

  • SSDEEP

    3072:uwzvOYTN5YP/aKava1bEvK9aobNI2B+flkL7OjUuxGftPyhdY55s2ZUuyNFhyzz4:bNiP/aK1z9H/B+/kBV+UdvrEFp7hKD3m

Malware Config

Targets

    • Target

      372dce651e424b00ec9f8ee7fd77a6032201d5712e8b169ac3c635a818d6a94c

    • Size

      234KB

    • MD5

      4b9fa527f9bbb43560ac79ce3fe8a114

    • SHA1

      188a10575bcc8b678722be387f55b8d311aea05e

    • SHA256

      372dce651e424b00ec9f8ee7fd77a6032201d5712e8b169ac3c635a818d6a94c

    • SHA512

      e153b92ededafd4aabca1e59b944c7d3248169337286bc59a5e5597339a092ff4754e0dfd96cb45b958140f2882cc7a5451c6d9580bae14badc6f26849df47ed

    • SSDEEP

      3072:uwzvOYTN5YP/aKava1bEvK9aobNI2B+flkL7OjUuxGftPyhdY55s2ZUuyNFhyzz4:bNiP/aK1z9H/B+/kBV+UdvrEFp7hKD3m

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks