General

  • Target

    f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f

  • Size

    286KB

  • Sample

    241214-bjpa8ssmgw

  • MD5

    ddceefc560566c72532c469711df1a90

  • SHA1

    4958dd1cc14e3ecabc489f906a82bffb909817a9

  • SHA256

    f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f

  • SHA512

    5b9aa27665f7fb15c148ce54c70db22a49c1f572d112b3f67de8ab349c1c2c7c60b610b79847fdf32106502d6b8302bd3ad0d75dc3dcfa59257484652501fd32

  • SSDEEP

    6144:e7gLU/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKeU:e7gLU/JuyXnPB+h8WHlBjvrEH77U

Malware Config

Targets

    • Target

      f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f

    • Size

      286KB

    • MD5

      ddceefc560566c72532c469711df1a90

    • SHA1

      4958dd1cc14e3ecabc489f906a82bffb909817a9

    • SHA256

      f4fda4d565d781dcdec21efb6d62fecafe105f86021c6268f8f0ff014251075f

    • SHA512

      5b9aa27665f7fb15c148ce54c70db22a49c1f572d112b3f67de8ab349c1c2c7c60b610b79847fdf32106502d6b8302bd3ad0d75dc3dcfa59257484652501fd32

    • SSDEEP

      6144:e7gLU/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKeU:e7gLU/JuyXnPB+h8WHlBjvrEH77U

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks