General

  • Target

    e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52

  • Size

    554KB

  • Sample

    241222-b742laykbt

  • MD5

    7238a5ed89e3be13c3b6ea3ee0e39540

  • SHA1

    0b0d6a91097cb3b7d56f061aa32de8c16557fae5

  • SHA256

    e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52

  • SHA512

    546c5a2df624d8a67e95d7a8c0f511e292f94394f2845d432a57c8573ffadfc068df0298ca4da63a2bc61b6439a2f6615153b86129f450320af9aec714e4714d

  • SSDEEP

    12288:dNaDfsMMSsMMfBvMcsCMcs/fkx0+RtV1QLttnu3R1MZEJIXBjvrEH7J:dIDfsMMSsMMfBvMcsCMcs/M0+RmJtuTT

Malware Config

Targets

    • Target

      e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52

    • Size

      554KB

    • MD5

      7238a5ed89e3be13c3b6ea3ee0e39540

    • SHA1

      0b0d6a91097cb3b7d56f061aa32de8c16557fae5

    • SHA256

      e38e7bd3284f54c203e8b71fed5464c830369d21371e21093545b61c8c436a52

    • SHA512

      546c5a2df624d8a67e95d7a8c0f511e292f94394f2845d432a57c8573ffadfc068df0298ca4da63a2bc61b6439a2f6615153b86129f450320af9aec714e4714d

    • SSDEEP

      12288:dNaDfsMMSsMMfBvMcsCMcs/fkx0+RtV1QLttnu3R1MZEJIXBjvrEH7J:dIDfsMMSsMMfBvMcsCMcs/M0+RmJtuTT

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks