General

  • Target

    75cb2dd77bb88fac6ceed00fd367ad67f11feb52f5d174e8d5289781488c9bc4

  • Size

    554KB

  • Sample

    241224-hh6bpasna1

  • MD5

    9662b17aee6d8d2a506e5b88625aea1b

  • SHA1

    86116a4c0e1d852a21314c14f6b686e6e0fdda1a

  • SHA256

    75cb2dd77bb88fac6ceed00fd367ad67f11feb52f5d174e8d5289781488c9bc4

  • SHA512

    7c5de7040650da25a51b35150ecddcf55f55c42baf25e4a0d10d56742701b67aedde9c05b5d87ab918c128f39ddaabb26e69d25c98638c4d782ef60b7a8b9640

  • SSDEEP

    12288:dNaDfsMMSsMMfBvMcsCMcs/fkx0+RT/S1QrW5tnu3R1MZEJIXBjvrEH70d:dIDfsMMSsMMfBvMcsCMcs/M0+RT/pctz

Malware Config

Targets

    • Target

      75cb2dd77bb88fac6ceed00fd367ad67f11feb52f5d174e8d5289781488c9bc4

    • Size

      554KB

    • MD5

      9662b17aee6d8d2a506e5b88625aea1b

    • SHA1

      86116a4c0e1d852a21314c14f6b686e6e0fdda1a

    • SHA256

      75cb2dd77bb88fac6ceed00fd367ad67f11feb52f5d174e8d5289781488c9bc4

    • SHA512

      7c5de7040650da25a51b35150ecddcf55f55c42baf25e4a0d10d56742701b67aedde9c05b5d87ab918c128f39ddaabb26e69d25c98638c4d782ef60b7a8b9640

    • SSDEEP

      12288:dNaDfsMMSsMMfBvMcsCMcs/fkx0+RT/S1QrW5tnu3R1MZEJIXBjvrEH70d:dIDfsMMSsMMfBvMcsCMcs/M0+RT/pctz

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks