General

  • Target

    8d807ffb5a1e3ef507623bdd3401335090dd4e0484e325680aa3d25125432287N.exe

  • Size

    130KB

  • Sample

    241218-k3k8cssnay

  • MD5

    867e13c7da936c97250dcb5525b2a460

  • SHA1

    debfe70fc60711e7a0c8fc006e226a91ba52af3d

  • SHA256

    8d807ffb5a1e3ef507623bdd3401335090dd4e0484e325680aa3d25125432287

  • SHA512

    63bbf5195d3d3d929ddd197eb1e025cd1a3c771d3cc16e0c03f3fb834ff5c0bf04ebb0b4332098163997a8c6c59d03a0df41198c07d6cf925688a199dc30bd6f

  • SSDEEP

    3072:2nKe1Z7nXvG3BAC2lQBV+UdE+rECWp7hKkC:yKwZ7n/6fBV+UdvrEFp7hKkC

Malware Config

Targets

    • Target

      8d807ffb5a1e3ef507623bdd3401335090dd4e0484e325680aa3d25125432287N.exe

    • Size

      130KB

    • MD5

      867e13c7da936c97250dcb5525b2a460

    • SHA1

      debfe70fc60711e7a0c8fc006e226a91ba52af3d

    • SHA256

      8d807ffb5a1e3ef507623bdd3401335090dd4e0484e325680aa3d25125432287

    • SHA512

      63bbf5195d3d3d929ddd197eb1e025cd1a3c771d3cc16e0c03f3fb834ff5c0bf04ebb0b4332098163997a8c6c59d03a0df41198c07d6cf925688a199dc30bd6f

    • SSDEEP

      3072:2nKe1Z7nXvG3BAC2lQBV+UdE+rECWp7hKkC:yKwZ7n/6fBV+UdvrEFp7hKkC

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks