General

  • Target

    de47dacba990483703f2b8c0d99601885861c5a0a7491d7d26680e17fdde7a87

  • Size

    535KB

  • Sample

    241216-sye5jstnft

  • MD5

    bb89aaf78b720e6ec108ebcbbdb267c8

  • SHA1

    8a04d0d7111de3339a7a46394f6ad647623fcac4

  • SHA256

    de47dacba990483703f2b8c0d99601885861c5a0a7491d7d26680e17fdde7a87

  • SHA512

    053480bbdb39cf5ca39b2e18df0cbc56e3b7f679ef64d0d58febbed3db13430e0ef5abf58aa459b316f6ba126dd6bf22c4438e2c4b2389e2158a58506759c140

  • SSDEEP

    12288:Y3UiP61nnQKTVNx3lqHWhK0+SbmUICEoBjvrEH7g:WP61Q0Nx3cHWhK0xmZC5rEH7g

Malware Config

Targets

    • Target

      de47dacba990483703f2b8c0d99601885861c5a0a7491d7d26680e17fdde7a87

    • Size

      535KB

    • MD5

      bb89aaf78b720e6ec108ebcbbdb267c8

    • SHA1

      8a04d0d7111de3339a7a46394f6ad647623fcac4

    • SHA256

      de47dacba990483703f2b8c0d99601885861c5a0a7491d7d26680e17fdde7a87

    • SHA512

      053480bbdb39cf5ca39b2e18df0cbc56e3b7f679ef64d0d58febbed3db13430e0ef5abf58aa459b316f6ba126dd6bf22c4438e2c4b2389e2158a58506759c140

    • SSDEEP

      12288:Y3UiP61nnQKTVNx3lqHWhK0+SbmUICEoBjvrEH7g:WP61Q0Nx3cHWhK0xmZC5rEH7g

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks