General

  • Target

    6c685d8ca00bb75041f95dc20cae8ed88cd6f054b2524d3a1d2c553bfd19af5a

  • Size

    487KB

  • Sample

    241224-287rzszpc1

  • MD5

    55fefb5dcdb90cdd25c082c3e0359b8f

  • SHA1

    60a324bbc7118055342a9b879b5d3db07d663099

  • SHA256

    6c685d8ca00bb75041f95dc20cae8ed88cd6f054b2524d3a1d2c553bfd19af5a

  • SHA512

    f03a131b09d9f012181c23136092465045e059aaf8edea376eca18dd242344fac9525c051470af3657389cbf7904697273b924099199e68589ac47f874c9e57f

  • SSDEEP

    12288:ENb8zxr2lPaHX7dyP57rhUgiW6QR7t5qv3Ooc8UHkC2ejGVBjvrEH7+yk:ENb8FCaHX7dyP5Kv3Ooc8UHkC2eKbrEQ

Malware Config

Targets

    • Target

      6c685d8ca00bb75041f95dc20cae8ed88cd6f054b2524d3a1d2c553bfd19af5a

    • Size

      487KB

    • MD5

      55fefb5dcdb90cdd25c082c3e0359b8f

    • SHA1

      60a324bbc7118055342a9b879b5d3db07d663099

    • SHA256

      6c685d8ca00bb75041f95dc20cae8ed88cd6f054b2524d3a1d2c553bfd19af5a

    • SHA512

      f03a131b09d9f012181c23136092465045e059aaf8edea376eca18dd242344fac9525c051470af3657389cbf7904697273b924099199e68589ac47f874c9e57f

    • SSDEEP

      12288:ENb8zxr2lPaHX7dyP57rhUgiW6QR7t5qv3Ooc8UHkC2ejGVBjvrEH7+yk:ENb8FCaHX7dyP5Kv3Ooc8UHkC2eKbrEQ

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks