General

  • Target

    5654d1f9a94d77ef281026ddeba4d1fe9f9044fbd6341bca1deec3e3bc2108ab

  • Size

    133KB

  • Sample

    241216-2d8qsssjdy

  • MD5

    9efb2d91ba6ba44905d45f1c9c59b2f8

  • SHA1

    cd5f164a1dff90b987bc99b6bfa5146e0ebe9baf

  • SHA256

    5654d1f9a94d77ef281026ddeba4d1fe9f9044fbd6341bca1deec3e3bc2108ab

  • SHA512

    7b3da7c8a3fb1d73f633c4e80f55891611722dd5cf22f9eb4e77783a889cffab265e2bdcd097d1c4d4e0262d4735c351939698f9b8e2ea648998fa91d6549ce0

  • SSDEEP

    3072:XGM3/Yx2+52lQBV+UdE+rECWp7hKNFTP22GTZNglv:XGm0BV+UdvrEFp7hK1

Malware Config

Targets

    • Target

      5654d1f9a94d77ef281026ddeba4d1fe9f9044fbd6341bca1deec3e3bc2108ab

    • Size

      133KB

    • MD5

      9efb2d91ba6ba44905d45f1c9c59b2f8

    • SHA1

      cd5f164a1dff90b987bc99b6bfa5146e0ebe9baf

    • SHA256

      5654d1f9a94d77ef281026ddeba4d1fe9f9044fbd6341bca1deec3e3bc2108ab

    • SHA512

      7b3da7c8a3fb1d73f633c4e80f55891611722dd5cf22f9eb4e77783a889cffab265e2bdcd097d1c4d4e0262d4735c351939698f9b8e2ea648998fa91d6549ce0

    • SSDEEP

      3072:XGM3/Yx2+52lQBV+UdE+rECWp7hKNFTP22GTZNglv:XGm0BV+UdvrEFp7hK1

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks