General

  • Target

    ec13f798caedf178bdc2df73331577531fa6d1f053d03d39bd9381681378d6bbN.exe

  • Size

    144KB

  • Sample

    241216-aaak2stlbv

  • MD5

    2588d9a0e7d3151a2baa29d7d8949020

  • SHA1

    10907d378fb6c1a341350d8a16bdcacbceb7fda8

  • SHA256

    ec13f798caedf178bdc2df73331577531fa6d1f053d03d39bd9381681378d6bb

  • SHA512

    5332e0a97b2e3a32de3f70ef7cde34cf18dce5a91e2f8c1319089012dbd47492def804166db230ba8335b83a647d91740479943d07508695bb26b89e64cb5423

  • SSDEEP

    1536:IvJnZUFF1F9coTxrb/GLIecomTN2s+zheW6BVrqzCJ3bdDY+W14N4NmzWlIA7hKx:IdZ6uIZoQ2lQBV+UdE+rECWp7hKcyZ55

Malware Config

Targets

    • Target

      ec13f798caedf178bdc2df73331577531fa6d1f053d03d39bd9381681378d6bbN.exe

    • Size

      144KB

    • MD5

      2588d9a0e7d3151a2baa29d7d8949020

    • SHA1

      10907d378fb6c1a341350d8a16bdcacbceb7fda8

    • SHA256

      ec13f798caedf178bdc2df73331577531fa6d1f053d03d39bd9381681378d6bb

    • SHA512

      5332e0a97b2e3a32de3f70ef7cde34cf18dce5a91e2f8c1319089012dbd47492def804166db230ba8335b83a647d91740479943d07508695bb26b89e64cb5423

    • SSDEEP

      1536:IvJnZUFF1F9coTxrb/GLIecomTN2s+zheW6BVrqzCJ3bdDY+W14N4NmzWlIA7hKx:IdZ6uIZoQ2lQBV+UdE+rECWp7hKcyZ55

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks