General

  • Target

    b48ebf00076742f66dafe35f495842a0dfedef330816c0ccff8736ebcdd4bbd6

  • Size

    287KB

  • Sample

    241221-y8pdvsynf1

  • MD5

    59463dbd50e3a180b350b6014595dbda

  • SHA1

    55d87aea385b23b1a0b2101ca7ea99858b19b4da

  • SHA256

    b48ebf00076742f66dafe35f495842a0dfedef330816c0ccff8736ebcdd4bbd6

  • SHA512

    3a1aa2e9bb685c23a4c42d1cb4ab46bd2e0b559a1071fd79f9f1b1ee6edb4199fc16e7957975b94c602721d3a524e80d5c78e55112728d8498f0821b674cc064

  • SSDEEP

    6144:WzTF8NJ1kHnuyXTZBB+R8WpMBV+UdvrEFp7hKg2:WzTGNJauyXTvB+R8WiBjvrEH7j2

Malware Config

Targets

    • Target

      b48ebf00076742f66dafe35f495842a0dfedef330816c0ccff8736ebcdd4bbd6

    • Size

      287KB

    • MD5

      59463dbd50e3a180b350b6014595dbda

    • SHA1

      55d87aea385b23b1a0b2101ca7ea99858b19b4da

    • SHA256

      b48ebf00076742f66dafe35f495842a0dfedef330816c0ccff8736ebcdd4bbd6

    • SHA512

      3a1aa2e9bb685c23a4c42d1cb4ab46bd2e0b559a1071fd79f9f1b1ee6edb4199fc16e7957975b94c602721d3a524e80d5c78e55112728d8498f0821b674cc064

    • SSDEEP

      6144:WzTF8NJ1kHnuyXTZBB+R8WpMBV+UdvrEFp7hKg2:WzTGNJauyXTvB+R8WiBjvrEH7j2

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks