General

  • Target

    391e8ca58b1e9818261d595c5c7f06712a960e70a4a60f3687624bb85e5bdfeb

  • Size

    1.9MB

  • Sample

    241220-jb8nxatje1

  • MD5

    31ff206b67405d9318c9acc7aac2a00b

  • SHA1

    da5640a80e58e5be57356a0972efaa5ae85fcca3

  • SHA256

    391e8ca58b1e9818261d595c5c7f06712a960e70a4a60f3687624bb85e5bdfeb

  • SHA512

    a7dc321c2cfab0a4f56259f0940e865842035a6c1c69a2f8a365f693b38d5858bd1d5e7eeb036a96addf57a37d414ffcfe7027bfe270b9f6bf484feff7659092

  • SSDEEP

    49152:9hdI6XWUh10/pFVoXiEEE/Megg/dX7uN+:9hdI6mY10/pFV0BX/Meb/dX7t

Malware Config

Targets

    • Target

      391e8ca58b1e9818261d595c5c7f06712a960e70a4a60f3687624bb85e5bdfeb

    • Size

      1.9MB

    • MD5

      31ff206b67405d9318c9acc7aac2a00b

    • SHA1

      da5640a80e58e5be57356a0972efaa5ae85fcca3

    • SHA256

      391e8ca58b1e9818261d595c5c7f06712a960e70a4a60f3687624bb85e5bdfeb

    • SHA512

      a7dc321c2cfab0a4f56259f0940e865842035a6c1c69a2f8a365f693b38d5858bd1d5e7eeb036a96addf57a37d414ffcfe7027bfe270b9f6bf484feff7659092

    • SSDEEP

      49152:9hdI6XWUh10/pFVoXiEEE/Megg/dX7uN+:9hdI6mY10/pFV0BX/Meb/dX7t

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks