General

  • Target

    499a05b23d22edcb643a794e270703537cba3b6328eb40e228f59a7df2dba476

  • Size

    171KB

  • Sample

    241219-3c619atkgq

  • MD5

    3b9308c1853a885cd2a0f893822dcd6a

  • SHA1

    8f02c170a227906de61c106a2304872cc4a8591f

  • SHA256

    499a05b23d22edcb643a794e270703537cba3b6328eb40e228f59a7df2dba476

  • SHA512

    9dd3a5ce7e28e495151afcdde06ea8cd2ddd09682513e99cc8e5ff02dfe202ec9b689510642ed650972ca5bf3d929868e9b34468738c2272ed7b5d1aba0571c2

  • SSDEEP

    3072:hwqD1L8TIyzq0et+ui1yr2lQBV+UdE+rECWp7hKjo4K:KqJ8ctJvBV+UdvrEFp7hKfK

Malware Config

Targets

    • Target

      499a05b23d22edcb643a794e270703537cba3b6328eb40e228f59a7df2dba476

    • Size

      171KB

    • MD5

      3b9308c1853a885cd2a0f893822dcd6a

    • SHA1

      8f02c170a227906de61c106a2304872cc4a8591f

    • SHA256

      499a05b23d22edcb643a794e270703537cba3b6328eb40e228f59a7df2dba476

    • SHA512

      9dd3a5ce7e28e495151afcdde06ea8cd2ddd09682513e99cc8e5ff02dfe202ec9b689510642ed650972ca5bf3d929868e9b34468738c2272ed7b5d1aba0571c2

    • SSDEEP

      3072:hwqD1L8TIyzq0et+ui1yr2lQBV+UdE+rECWp7hKjo4K:KqJ8ctJvBV+UdvrEFp7hKfK

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks