General

  • Target

    cd0bafa322d60d4b2ed34c915d5d53c83c582a6a400039f6822adfce662f28ce

  • Size

    286KB

  • Sample

    241214-bk75qssnas

  • MD5

    d58a6d6d9fe425663695028384c6413b

  • SHA1

    7c186b4cb5cbddf1d64e00811cec6cf36ba45066

  • SHA256

    cd0bafa322d60d4b2ed34c915d5d53c83c582a6a400039f6822adfce662f28ce

  • SHA512

    2c1037e197d0ebd1353345989a516914b4695c2631fd02edb9886e287b3c25136d05a92435a9243fefc07b9ce8fafe8f70e6aacda141963a2118f1aee99559bd

  • SSDEEP

    6144:s7gKNkNm5kHouyXnZhB+h8WHlBV+UdvrEFp7hK4c:s7gKNkNmJuyXnPB+h8WHlBjvrEH7lc

Malware Config

Targets

    • Target

      cd0bafa322d60d4b2ed34c915d5d53c83c582a6a400039f6822adfce662f28ce

    • Size

      286KB

    • MD5

      d58a6d6d9fe425663695028384c6413b

    • SHA1

      7c186b4cb5cbddf1d64e00811cec6cf36ba45066

    • SHA256

      cd0bafa322d60d4b2ed34c915d5d53c83c582a6a400039f6822adfce662f28ce

    • SHA512

      2c1037e197d0ebd1353345989a516914b4695c2631fd02edb9886e287b3c25136d05a92435a9243fefc07b9ce8fafe8f70e6aacda141963a2118f1aee99559bd

    • SSDEEP

      6144:s7gKNkNm5kHouyXnZhB+h8WHlBV+UdvrEFp7hK4c:s7gKNkNmJuyXnPB+h8WHlBjvrEH7lc

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks