General

  • Target

    f2519d5a034803364e71d879b0b2a2ea674835647cdd908f9d2e58583becb1b0

  • Size

    277KB

  • Sample

    241218-g376caxjb1

  • MD5

    16275ec6459cb99846dcc24ab9bbffef

  • SHA1

    6bf0c7a3088fc007b3192828da2a9c5a0c99c3e0

  • SHA256

    f2519d5a034803364e71d879b0b2a2ea674835647cdd908f9d2e58583becb1b0

  • SHA512

    757aacf83a5de19d2e94258a64dbf5c63da0b37def67093cf6f5cb5e433b089bfa9ccf418f6cc4283330ac5a837260e3bcc22f5e7060758b90d9a33d3f4a4a22

  • SSDEEP

    6144:MoAql/DRfkTC3dM7B+mCLBV+UdvrEFp7hKIH:MoAqlbRfky6B+mCLBjvrEH71H

Malware Config

Targets

    • Target

      f2519d5a034803364e71d879b0b2a2ea674835647cdd908f9d2e58583becb1b0

    • Size

      277KB

    • MD5

      16275ec6459cb99846dcc24ab9bbffef

    • SHA1

      6bf0c7a3088fc007b3192828da2a9c5a0c99c3e0

    • SHA256

      f2519d5a034803364e71d879b0b2a2ea674835647cdd908f9d2e58583becb1b0

    • SHA512

      757aacf83a5de19d2e94258a64dbf5c63da0b37def67093cf6f5cb5e433b089bfa9ccf418f6cc4283330ac5a837260e3bcc22f5e7060758b90d9a33d3f4a4a22

    • SSDEEP

      6144:MoAql/DRfkTC3dM7B+mCLBV+UdvrEFp7hKIH:MoAqlbRfky6B+mCLBjvrEH71H

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks