General

  • Target

    ecfb1b075079a0ed6bad844d70f468748879f1820f5b376d329a6bb2e867ad37N.exe

  • Size

    170KB

  • Sample

    241219-291p3asphy

  • MD5

    131f32055e101e65647c3338e4a0b240

  • SHA1

    354727265de946b3d24660f85e08f671d539e285

  • SHA256

    ecfb1b075079a0ed6bad844d70f468748879f1820f5b376d329a6bb2e867ad37

  • SHA512

    f5fb0c9a4ce3216513ed5bf68fc91a26cdf35ed2f20453ca49c40ae9ff9474e96df58afb75d2ff9221e66d3167cb6699b72af173c44e4df0b4a49d8e4b2cc0ea

  • SSDEEP

    3072:3po0Y6ZweTaif6sCGP2lQBV+UdE+rECWp7hKHO:59Zwe5BV+UdvrEFp7hKu

Malware Config

Targets

    • Target

      ecfb1b075079a0ed6bad844d70f468748879f1820f5b376d329a6bb2e867ad37N.exe

    • Size

      170KB

    • MD5

      131f32055e101e65647c3338e4a0b240

    • SHA1

      354727265de946b3d24660f85e08f671d539e285

    • SHA256

      ecfb1b075079a0ed6bad844d70f468748879f1820f5b376d329a6bb2e867ad37

    • SHA512

      f5fb0c9a4ce3216513ed5bf68fc91a26cdf35ed2f20453ca49c40ae9ff9474e96df58afb75d2ff9221e66d3167cb6699b72af173c44e4df0b4a49d8e4b2cc0ea

    • SSDEEP

      3072:3po0Y6ZweTaif6sCGP2lQBV+UdE+rECWp7hKHO:59Zwe5BV+UdvrEFp7hKu

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks