General

  • Target

    7a2c05fd8f2531cf5ec23483c824bea0b71533478a2f65ae19aee0f7fc66fa89N.exe

  • Size

    154KB

  • Sample

    241217-dslb2synav

  • MD5

    d5e7d0fed11e783818033f410321a190

  • SHA1

    411e52925538c82a1c2c5253e559e97f4efeb47a

  • SHA256

    7a2c05fd8f2531cf5ec23483c824bea0b71533478a2f65ae19aee0f7fc66fa89

  • SHA512

    36a95a83baf429e3fb486118264124fd9572db0a67dbcfc7d1c5fe7a9da69a3ae3cbe3944f327c7dab89a4e2bf8aa766734e8b54c9a7f054eab1ae3173315aba

  • SSDEEP

    3072:X4avuRm/U31OMurRW+gR+8rwXfOdy5Jb2lQBV+UdE+rECWp7hKHY:g0MurRWrr2Gdy5JfBV+UdvrEFp7hKHY

Malware Config

Targets

    • Target

      7a2c05fd8f2531cf5ec23483c824bea0b71533478a2f65ae19aee0f7fc66fa89N.exe

    • Size

      154KB

    • MD5

      d5e7d0fed11e783818033f410321a190

    • SHA1

      411e52925538c82a1c2c5253e559e97f4efeb47a

    • SHA256

      7a2c05fd8f2531cf5ec23483c824bea0b71533478a2f65ae19aee0f7fc66fa89

    • SHA512

      36a95a83baf429e3fb486118264124fd9572db0a67dbcfc7d1c5fe7a9da69a3ae3cbe3944f327c7dab89a4e2bf8aa766734e8b54c9a7f054eab1ae3173315aba

    • SSDEEP

      3072:X4avuRm/U31OMurRW+gR+8rwXfOdy5Jb2lQBV+UdE+rECWp7hKHY:g0MurRWrr2Gdy5JfBV+UdvrEFp7hKHY

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks