General

  • Target

    28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220fN.exe

  • Size

    815KB

  • Sample

    241219-lb42tsyper

  • MD5

    6f338b0d8b648b27f0e24cd039443710

  • SHA1

    b4fae72c22350e439e3dbd17614c37a6ecfcdbda

  • SHA256

    28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220f

  • SHA512

    b034720321e33c0c930c0aa60cfede911b493fea3ad6ae19b8fb086254abfb72c2493b1616cc309a7ee02876d75457c0df90996fe030287d5b750ee614007b78

  • SSDEEP

    24576:miOWmE9/SsSCpyaUk3qPb7hxavnMRGJ/qofTW:Bz9/SNCdUkELQB1qz

Malware Config

Targets

    • Target

      28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220fN.exe

    • Size

      815KB

    • MD5

      6f338b0d8b648b27f0e24cd039443710

    • SHA1

      b4fae72c22350e439e3dbd17614c37a6ecfcdbda

    • SHA256

      28edce104675407012f7cb2d1808cf4479e286629a387eecbfc38ad35fc3220f

    • SHA512

      b034720321e33c0c930c0aa60cfede911b493fea3ad6ae19b8fb086254abfb72c2493b1616cc309a7ee02876d75457c0df90996fe030287d5b750ee614007b78

    • SSDEEP

      24576:miOWmE9/SsSCpyaUk3qPb7hxavnMRGJ/qofTW:Bz9/SNCdUkELQB1qz

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks