General

  • Target

    a0b4b22f748333e545bf9a00821063b7bff4d6b432a213b58f6fdf119434473aN.exe

  • Size

    698KB

  • Sample

    241218-j95d5ssncq

  • MD5

    5f69532eb5eb9a4dc6b91de117311b60

  • SHA1

    030efb4f5979e7a6607f9430a23942fdc2f587cc

  • SHA256

    a0b4b22f748333e545bf9a00821063b7bff4d6b432a213b58f6fdf119434473a

  • SHA512

    5a8f6e05c41eefe740059968b50774eede2fcc3e9b6367ce4599b9d9fb96422dc228961716b36eca171ba550ed4492aca2114f50917eb7b1e4168d0fe2b39e0f

  • SSDEEP

    12288:6pygEUSxK+3BLJQTaU7PYeSTWbFI1qGdtza4osfgVWMQJ6BjvrEH7p:OEUSvxLJQTaUEdWxIj/1ohKMrEH7p

Malware Config

Targets

    • Target

      a0b4b22f748333e545bf9a00821063b7bff4d6b432a213b58f6fdf119434473aN.exe

    • Size

      698KB

    • MD5

      5f69532eb5eb9a4dc6b91de117311b60

    • SHA1

      030efb4f5979e7a6607f9430a23942fdc2f587cc

    • SHA256

      a0b4b22f748333e545bf9a00821063b7bff4d6b432a213b58f6fdf119434473a

    • SHA512

      5a8f6e05c41eefe740059968b50774eede2fcc3e9b6367ce4599b9d9fb96422dc228961716b36eca171ba550ed4492aca2114f50917eb7b1e4168d0fe2b39e0f

    • SSDEEP

      12288:6pygEUSxK+3BLJQTaU7PYeSTWbFI1qGdtza4osfgVWMQJ6BjvrEH7p:OEUSvxLJQTaUEdWxIj/1ohKMrEH7p

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks