General

  • Target

    c6098a6b459f992eff98b451ecc223c80feda2c2bbbcd340ab12a83e2401b5c6

  • Size

    234KB

  • Sample

    241214-bjpl1atqej

  • MD5

    d8f10d6fe365d711c4d53039e432be77

  • SHA1

    da5b5ae4058131c6fbb53bc394e38d2145e3640e

  • SHA256

    c6098a6b459f992eff98b451ecc223c80feda2c2bbbcd340ab12a83e2401b5c6

  • SHA512

    54a8c9ebdec5d4c43f65f673f85f9949911f33d66df068b9a2963415ca32c8614d65cd3e40424321d6886e747da7444accc6fd572d809a26f944ee87d70ca751

  • SSDEEP

    3072:uwzvOYTPu/aKavT/DvbEvK9aobNI2B+flkL7OjUuxGftPyhdY55s2ZUuyNFhyzzn:bPu/aK2h9H/B+/kBV+UdvrEFp7hKrSty

Malware Config

Targets

    • Target

      c6098a6b459f992eff98b451ecc223c80feda2c2bbbcd340ab12a83e2401b5c6

    • Size

      234KB

    • MD5

      d8f10d6fe365d711c4d53039e432be77

    • SHA1

      da5b5ae4058131c6fbb53bc394e38d2145e3640e

    • SHA256

      c6098a6b459f992eff98b451ecc223c80feda2c2bbbcd340ab12a83e2401b5c6

    • SHA512

      54a8c9ebdec5d4c43f65f673f85f9949911f33d66df068b9a2963415ca32c8614d65cd3e40424321d6886e747da7444accc6fd572d809a26f944ee87d70ca751

    • SSDEEP

      3072:uwzvOYTPu/aKavT/DvbEvK9aobNI2B+flkL7OjUuxGftPyhdY55s2ZUuyNFhyzzn:bPu/aK2h9H/B+/kBV+UdvrEFp7hKrSty

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks