General

  • Target

    5a79981c4c34b77b391f444a8ac4fa87c270ce8677c385872adb51ba87876727

  • Size

    3.0MB

  • Sample

    241224-2fdnfayqdw

  • MD5

    b7d0c72005a7b447059dfd00108c0132

  • SHA1

    56584a42822bb19bda4c79d8729996bff111f539

  • SHA256

    5a79981c4c34b77b391f444a8ac4fa87c270ce8677c385872adb51ba87876727

  • SHA512

    3a4c2d7be5c4352c44b24d7c52a22a2ca9be503c913e7e462e76473f5d2a04f805b8d24600e6e7c9e5c20a3770839def14f1375ad5b87ac05695a9d501dcfa4b

  • SSDEEP

    49152:tA4aPLjKowKuTTjEItjnIm/1jQVwvOjTY1tjlz3ZUSY8458BjISDdAQXiGHW:qXPLj9iEMjnIGj2w+cjlz3m/0jIaXdW

Malware Config

Targets

    • Target

      5a79981c4c34b77b391f444a8ac4fa87c270ce8677c385872adb51ba87876727

    • Size

      3.0MB

    • MD5

      b7d0c72005a7b447059dfd00108c0132

    • SHA1

      56584a42822bb19bda4c79d8729996bff111f539

    • SHA256

      5a79981c4c34b77b391f444a8ac4fa87c270ce8677c385872adb51ba87876727

    • SHA512

      3a4c2d7be5c4352c44b24d7c52a22a2ca9be503c913e7e462e76473f5d2a04f805b8d24600e6e7c9e5c20a3770839def14f1375ad5b87ac05695a9d501dcfa4b

    • SSDEEP

      49152:tA4aPLjKowKuTTjEItjnIm/1jQVwvOjTY1tjlz3ZUSY8458BjISDdAQXiGHW:qXPLj9iEMjnIGj2w+cjlz3m/0jIaXdW

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks