General

  • Target

    0b649165969dcc070c6b4b94d8443a88b2b13e96276a81cd93077d8256370368N.exe

  • Size

    1.5MB

  • Sample

    241216-pmc92azpft

  • MD5

    c8ec2d4fa3692c5552eae6d40841b8a0

  • SHA1

    736098d91d6f4920493ca99d541343f0d3472a52

  • SHA256

    0b649165969dcc070c6b4b94d8443a88b2b13e96276a81cd93077d8256370368

  • SHA512

    f76aceb547bfd64492290a36350c13d79d74c6306dd679e551c66ac3d8f7effc4adbd30a77e70bb8b4c74d6c8ad37c9e00a56b743e35ae343cd74d7671a1b5da

  • SSDEEP

    24576:vH3q6cPO6Wf6VoGvwRdQeQAwhcJaLpL2Q7tkrEH7B:f66cXchGvwzQeQAweJaNCQ7t1

Malware Config

Targets

    • Target

      0b649165969dcc070c6b4b94d8443a88b2b13e96276a81cd93077d8256370368N.exe

    • Size

      1.5MB

    • MD5

      c8ec2d4fa3692c5552eae6d40841b8a0

    • SHA1

      736098d91d6f4920493ca99d541343f0d3472a52

    • SHA256

      0b649165969dcc070c6b4b94d8443a88b2b13e96276a81cd93077d8256370368

    • SHA512

      f76aceb547bfd64492290a36350c13d79d74c6306dd679e551c66ac3d8f7effc4adbd30a77e70bb8b4c74d6c8ad37c9e00a56b743e35ae343cd74d7671a1b5da

    • SSDEEP

      24576:vH3q6cPO6Wf6VoGvwRdQeQAwhcJaLpL2Q7tkrEH7B:f66cXchGvwzQeQAweJaNCQ7t1

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks