General

  • Target

    17411e3b2f32a0b35e120c8feae7dd3954afd0dcfe09197f1e022a2944ad7f81N.exe

  • Size

    242KB

  • Sample

    241217-bbt7hswnbr

  • MD5

    389f3ad24b3c4cc40927c7a40f6ddae0

  • SHA1

    919d690d2fc00b18cbbd5043b29c3a8979f3845d

  • SHA256

    17411e3b2f32a0b35e120c8feae7dd3954afd0dcfe09197f1e022a2944ad7f81

  • SHA512

    742029536f35f77164c9af94af07f1f92fdc2a864576866d7d9b15e86527b17bf60fc7868643f1fe89bfca23744e5472a43842e05b2c31607f313b0bc1da5663

  • SSDEEP

    6144:LLUD3zFClSbrqsQvMRlkM4RD/qzMfUiIF:LobzXQMRGM4h/qof+

Malware Config

Targets

    • Target

      17411e3b2f32a0b35e120c8feae7dd3954afd0dcfe09197f1e022a2944ad7f81N.exe

    • Size

      242KB

    • MD5

      389f3ad24b3c4cc40927c7a40f6ddae0

    • SHA1

      919d690d2fc00b18cbbd5043b29c3a8979f3845d

    • SHA256

      17411e3b2f32a0b35e120c8feae7dd3954afd0dcfe09197f1e022a2944ad7f81

    • SHA512

      742029536f35f77164c9af94af07f1f92fdc2a864576866d7d9b15e86527b17bf60fc7868643f1fe89bfca23744e5472a43842e05b2c31607f313b0bc1da5663

    • SSDEEP

      6144:LLUD3zFClSbrqsQvMRlkM4RD/qzMfUiIF:LobzXQMRGM4h/qof+

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks