General
-
Target
2024-12-23_b5564521e7f0c7ef8ceefe141469e90f_floxif_magniber
-
Size
27.3MB
-
Sample
241223-attg9sspgl
-
MD5
b5564521e7f0c7ef8ceefe141469e90f
-
SHA1
dbb2be0989e75f8d30b6cdd03b4ae1a9db2d7c03
-
SHA256
b910a6ffaeeb982bdb88a390c554c327e3eeb65ad2157c66b21f271c6e72818f
-
SHA512
b1b8d40a40890cc4e56d885a2435075c638c48a706bd517b11a1e797a0c57890f4227c56df3b1daf793b7027634f70d5e69b9191929b1dca5c1ac76c581296ca
-
SSDEEP
393216:dYnK/WGHjJIhMeoUzx3/g/WyUXM0rFfTAtZfeV3qyauJC5PL0IV8PRG/2Zze3qGo:2mHleVx3/2EbAOV3qc05TRVwc/0CfNA
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-23_b5564521e7f0c7ef8ceefe141469e90f_floxif_magniber.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-23_b5564521e7f0c7ef8ceefe141469e90f_floxif_magniber.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-23_b5564521e7f0c7ef8ceefe141469e90f_floxif_magniber
-
Size
27.3MB
-
MD5
b5564521e7f0c7ef8ceefe141469e90f
-
SHA1
dbb2be0989e75f8d30b6cdd03b4ae1a9db2d7c03
-
SHA256
b910a6ffaeeb982bdb88a390c554c327e3eeb65ad2157c66b21f271c6e72818f
-
SHA512
b1b8d40a40890cc4e56d885a2435075c638c48a706bd517b11a1e797a0c57890f4227c56df3b1daf793b7027634f70d5e69b9191929b1dca5c1ac76c581296ca
-
SSDEEP
393216:dYnK/WGHjJIhMeoUzx3/g/WyUXM0rFfTAtZfeV3qyauJC5PL0IV8PRG/2Zze3qGo:2mHleVx3/2EbAOV3qc05TRVwc/0CfNA
-
Floxif family
-
Detects Floxif payload
-
Drops file in Drivers directory
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Component Object Model Hijacking
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2AppInit DLLs
1Component Object Model Hijacking
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Modify Registry
2