General

  • Target

    188cb12cec34f38fa549630338e59ab229b740c4e57cf6d09c1a1e15b77c84caN.exe

  • Size

    6.7MB

  • Sample

    241220-gckx5asjbk

  • MD5

    2532c213b6769eb6b61fc4601f944280

  • SHA1

    5879ffcfac45b7fc55d530401a1c041a695a92c5

  • SHA256

    188cb12cec34f38fa549630338e59ab229b740c4e57cf6d09c1a1e15b77c84ca

  • SHA512

    4fd9f3891cb843ed5d87aae496168c46c22eed72aa0f5a0d8dbb500ce0fc6a7c6a743cb37b6355e74733e438a78cc630f62f068326ae2c1c922265413d988be5

  • SSDEEP

    49152:B3QVGCKKVwbbZzOIniBJy0BK7JHCRrdfOzsOaR0IxEgkUA1/gRE3RhgJIC9weS6d:B3QwCKusN1qBkJajAZj64/gZ85XH9js

Malware Config

Targets

    • Target

      188cb12cec34f38fa549630338e59ab229b740c4e57cf6d09c1a1e15b77c84caN.exe

    • Size

      6.7MB

    • MD5

      2532c213b6769eb6b61fc4601f944280

    • SHA1

      5879ffcfac45b7fc55d530401a1c041a695a92c5

    • SHA256

      188cb12cec34f38fa549630338e59ab229b740c4e57cf6d09c1a1e15b77c84ca

    • SHA512

      4fd9f3891cb843ed5d87aae496168c46c22eed72aa0f5a0d8dbb500ce0fc6a7c6a743cb37b6355e74733e438a78cc630f62f068326ae2c1c922265413d988be5

    • SSDEEP

      49152:B3QVGCKKVwbbZzOIniBJy0BK7JHCRrdfOzsOaR0IxEgkUA1/gRE3RhgJIC9weS6d:B3QwCKusN1qBkJajAZj64/gZ85XH9js

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks