General

  • Target

    aa48561737bbc5a08506c9bc17dc7bfc1799179372a5f3e4b5487155f6d6ca8dN.exe

  • Size

    2.7MB

  • Sample

    241219-bkczla1mar

  • MD5

    2278ae7d1260c5a84685e0acdba80920

  • SHA1

    6ba5da9abd7be8890a2d27f283a9339f80e861aa

  • SHA256

    aa48561737bbc5a08506c9bc17dc7bfc1799179372a5f3e4b5487155f6d6ca8d

  • SHA512

    77da7e0c4b1d30b21e86b7a09a469831d28999a0e1d16e8fa143f96c740b32dedfdc31d147cefd7d6274815c5892c060cf6d943d50fa3706f0c66a5e035ce4b8

  • SSDEEP

    49152:0y8f9DL6LRAvqi1vrP7VE2KGKpA5vXe8Sz6oj9ghi1RebpyT390bYVGuSwZPSCdQ:05PeRAii1vrPe2KPA9e8S2oj9ghi1ReP

Malware Config

Targets

    • Target

      aa48561737bbc5a08506c9bc17dc7bfc1799179372a5f3e4b5487155f6d6ca8dN.exe

    • Size

      2.7MB

    • MD5

      2278ae7d1260c5a84685e0acdba80920

    • SHA1

      6ba5da9abd7be8890a2d27f283a9339f80e861aa

    • SHA256

      aa48561737bbc5a08506c9bc17dc7bfc1799179372a5f3e4b5487155f6d6ca8d

    • SHA512

      77da7e0c4b1d30b21e86b7a09a469831d28999a0e1d16e8fa143f96c740b32dedfdc31d147cefd7d6274815c5892c060cf6d943d50fa3706f0c66a5e035ce4b8

    • SSDEEP

      49152:0y8f9DL6LRAvqi1vrP7VE2KGKpA5vXe8Sz6oj9ghi1RebpyT390bYVGuSwZPSCdQ:05PeRAii1vrPe2KPA9e8S2oj9ghi1ReP

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks