General

  • Target

    dcb3d0e68cf47662a8079835e6658a686a877c822455113af80b5f8cfc4eb329

  • Size

    229KB

  • Sample

    241214-bjpl1atqel

  • MD5

    000935002f635ce40033438928d1e1ad

  • SHA1

    d13ebc40805799bbb3bcb6c3541102f38e96eb26

  • SHA256

    dcb3d0e68cf47662a8079835e6658a686a877c822455113af80b5f8cfc4eb329

  • SHA512

    686bbb534a26e9cbafcf2ef56b87ea4ed8d24cf46f8b649c1aaee0e97c7f82d934e15fc76e7330fd6bc4ed77f57c8144b840c4561d32ac0dd5c5d4d3fe0a0f6c

  • SSDEEP

    3072:UAtZhSmfm5oyiTOZQvfSERdX9Zk8AtB+alonPCHwiVSj5j2VR0d54yVIyO5hpGbe:Fv+wjRsB+BP/BV+UdvrEFp7hKCN7

Malware Config

Targets

    • Target

      dcb3d0e68cf47662a8079835e6658a686a877c822455113af80b5f8cfc4eb329

    • Size

      229KB

    • MD5

      000935002f635ce40033438928d1e1ad

    • SHA1

      d13ebc40805799bbb3bcb6c3541102f38e96eb26

    • SHA256

      dcb3d0e68cf47662a8079835e6658a686a877c822455113af80b5f8cfc4eb329

    • SHA512

      686bbb534a26e9cbafcf2ef56b87ea4ed8d24cf46f8b649c1aaee0e97c7f82d934e15fc76e7330fd6bc4ed77f57c8144b840c4561d32ac0dd5c5d4d3fe0a0f6c

    • SSDEEP

      3072:UAtZhSmfm5oyiTOZQvfSERdX9Zk8AtB+alonPCHwiVSj5j2VR0d54yVIyO5hpGbe:Fv+wjRsB+BP/BV+UdvrEFp7hKCN7

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks