General

  • Target

    444c92f5b1de27c86b96057c7ede78782affc1519f66b3aef6baad77bf67b155

  • Size

    440KB

  • Sample

    241215-dpzp9stqeq

  • MD5

    4638d90a2f9eb0e879fca28c692d3c32

  • SHA1

    a212bcc05bee1a280c697fb5c861bfd1e08be8d9

  • SHA256

    444c92f5b1de27c86b96057c7ede78782affc1519f66b3aef6baad77bf67b155

  • SHA512

    3011c82bdab643996dff1fd4bb457b83db64d7a82227da61629c5cc65dfb9bf6eda730a0a0114f905b168fcf5e023e6b439a2abaccb4121760e3d8489832c340

  • SSDEEP

    12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjF8NO0qwxeWfF0220S0lqJC:+el3+k0DvfeUYqcZQCGm4YprEH7Xf

Malware Config

Targets

    • Target

      444c92f5b1de27c86b96057c7ede78782affc1519f66b3aef6baad77bf67b155

    • Size

      440KB

    • MD5

      4638d90a2f9eb0e879fca28c692d3c32

    • SHA1

      a212bcc05bee1a280c697fb5c861bfd1e08be8d9

    • SHA256

      444c92f5b1de27c86b96057c7ede78782affc1519f66b3aef6baad77bf67b155

    • SHA512

      3011c82bdab643996dff1fd4bb457b83db64d7a82227da61629c5cc65dfb9bf6eda730a0a0114f905b168fcf5e023e6b439a2abaccb4121760e3d8489832c340

    • SSDEEP

      12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjF8NO0qwxeWfF0220S0lqJC:+el3+k0DvfeUYqcZQCGm4YprEH7Xf

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks