General

  • Target

    766a6aee4e96b571bd549e4a61744f12a842c99ffae77a74d6afb733fcc70b80

  • Size

    811KB

  • Sample

    241216-cmlj7azphk

  • MD5

    f712ea70dd049bd214cacf00865f3c45

  • SHA1

    8f4836eb10350d5bfaa09e2b2b9d5a7d62c82148

  • SHA256

    766a6aee4e96b571bd549e4a61744f12a842c99ffae77a74d6afb733fcc70b80

  • SHA512

    77bc2c1ad7325a31cb748ed0d1d63a9f24022fa5f37400cd9a12f3286dc5961745ebda9ade6f6696929f8ab187e091540756ebcb4df2beb43cff7b99b53fc47a

  • SSDEEP

    12288:CmxsEGerEsTmsb6+s4AhSJg2Uy/NTJkr7uDBvhGpyZmaFgBjvrEH7j:CmvGCdTms07SJg+/Zqrih4yZmmCrEH7j

Malware Config

Targets

    • Target

      766a6aee4e96b571bd549e4a61744f12a842c99ffae77a74d6afb733fcc70b80

    • Size

      811KB

    • MD5

      f712ea70dd049bd214cacf00865f3c45

    • SHA1

      8f4836eb10350d5bfaa09e2b2b9d5a7d62c82148

    • SHA256

      766a6aee4e96b571bd549e4a61744f12a842c99ffae77a74d6afb733fcc70b80

    • SHA512

      77bc2c1ad7325a31cb748ed0d1d63a9f24022fa5f37400cd9a12f3286dc5961745ebda9ade6f6696929f8ab187e091540756ebcb4df2beb43cff7b99b53fc47a

    • SSDEEP

      12288:CmxsEGerEsTmsb6+s4AhSJg2Uy/NTJkr7uDBvhGpyZmaFgBjvrEH7j:CmvGCdTms07SJg+/Zqrih4yZmmCrEH7j

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks