General

  • Target

    26f01312c97faf0943e1989d07d56d52ea84c056a95fe8c365d46c85e00f5afd

  • Size

    234KB

  • Sample

    241217-jzfysswjfp

  • MD5

    de32f29320fa5440c0181eac8c0f9266

  • SHA1

    17438f8b5953348edee63cddbb79c53960f1a1eb

  • SHA256

    26f01312c97faf0943e1989d07d56d52ea84c056a95fe8c365d46c85e00f5afd

  • SHA512

    f05a0ecc3231aa86757fc8b2be8eff3ce294f25f68c6b11edf60632a9ca85ffbec2b48a1ff9e39c10b64a8f5f09def4ac57dd3846e316de8e8b7dd2b68333fe1

  • SSDEEP

    6144:b+GP/aK2h9H/B+/kBV+UdvrEFp7hKoIStN:b+GP/aK2vB+sBjvrEH7ZII

Malware Config

Targets

    • Target

      26f01312c97faf0943e1989d07d56d52ea84c056a95fe8c365d46c85e00f5afd

    • Size

      234KB

    • MD5

      de32f29320fa5440c0181eac8c0f9266

    • SHA1

      17438f8b5953348edee63cddbb79c53960f1a1eb

    • SHA256

      26f01312c97faf0943e1989d07d56d52ea84c056a95fe8c365d46c85e00f5afd

    • SHA512

      f05a0ecc3231aa86757fc8b2be8eff3ce294f25f68c6b11edf60632a9ca85ffbec2b48a1ff9e39c10b64a8f5f09def4ac57dd3846e316de8e8b7dd2b68333fe1

    • SSDEEP

      6144:b+GP/aK2h9H/B+/kBV+UdvrEFp7hKoIStN:b+GP/aK2vB+sBjvrEH7ZII

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks