General

  • Target

    f64e809845a9c0cd95d5601dbf49c93ae4bf8ff8fee2fc8fb6904dd9a9a0c6e8N.exe

  • Size

    1.2MB

  • Sample

    241217-hse79atlev

  • MD5

    623ee50f8991997deedf40d974a815d0

  • SHA1

    b97686b49930d7f6d370d5604e8903647bea9b3c

  • SHA256

    f64e809845a9c0cd95d5601dbf49c93ae4bf8ff8fee2fc8fb6904dd9a9a0c6e8

  • SHA512

    39d207fe29e41a8b39531153636aa6687a7bc083350968df4e287eb2f85862f9e0de9c212faf6cf596a343cc72fb39d0d3d2333f8cff445e1658530f9c860590

  • SSDEEP

    24576:3W+R0DLEIuJcJXe+4EzTiTRvuyzKoreoRX2VkSsrEH78T:3W+ELEBJUXeJkcpV7eYXsknT

Malware Config

Targets

    • Target

      f64e809845a9c0cd95d5601dbf49c93ae4bf8ff8fee2fc8fb6904dd9a9a0c6e8N.exe

    • Size

      1.2MB

    • MD5

      623ee50f8991997deedf40d974a815d0

    • SHA1

      b97686b49930d7f6d370d5604e8903647bea9b3c

    • SHA256

      f64e809845a9c0cd95d5601dbf49c93ae4bf8ff8fee2fc8fb6904dd9a9a0c6e8

    • SHA512

      39d207fe29e41a8b39531153636aa6687a7bc083350968df4e287eb2f85862f9e0de9c212faf6cf596a343cc72fb39d0d3d2333f8cff445e1658530f9c860590

    • SSDEEP

      24576:3W+R0DLEIuJcJXe+4EzTiTRvuyzKoreoRX2VkSsrEH78T:3W+ELEBJUXeJkcpV7eYXsknT

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks