General

  • Target

    dda82bad1edd2769835ac13ec5a55af991734e14bf0acfc27398fad9cfe9c168N.exe

  • Size

    118KB

  • Sample

    241222-cw2yjazmfj

  • MD5

    9432ce4f7076955e5773d98733c3c800

  • SHA1

    53341f3db4b6c1722a5ab66de628b468dee24191

  • SHA256

    dda82bad1edd2769835ac13ec5a55af991734e14bf0acfc27398fad9cfe9c168

  • SHA512

    37550cefbf58a75ebb06262be38bde448b440a805338ea5309209c3291e5c08d3170b85856ac8936384a09595d5a6b0426f480d13708e8a16979573deb286832

  • SSDEEP

    3072:GMXfjx+56/TKk6x2lQBV+UdE+rECWp7hKm9bu2:G2jx+5fkcBV+UdvrEFp7hKm9a2

Malware Config

Targets

    • Target

      dda82bad1edd2769835ac13ec5a55af991734e14bf0acfc27398fad9cfe9c168N.exe

    • Size

      118KB

    • MD5

      9432ce4f7076955e5773d98733c3c800

    • SHA1

      53341f3db4b6c1722a5ab66de628b468dee24191

    • SHA256

      dda82bad1edd2769835ac13ec5a55af991734e14bf0acfc27398fad9cfe9c168

    • SHA512

      37550cefbf58a75ebb06262be38bde448b440a805338ea5309209c3291e5c08d3170b85856ac8936384a09595d5a6b0426f480d13708e8a16979573deb286832

    • SSDEEP

      3072:GMXfjx+56/TKk6x2lQBV+UdE+rECWp7hKm9bu2:G2jx+5fkcBV+UdvrEFp7hKm9a2

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks