General

  • Target

    2d54c7cdd38bfaf7ceddc167d84c93a8b4ddf6553bb8fe0689fcf54bd2627438

  • Size

    394KB

  • Sample

    241224-zmpm6sxldj

  • MD5

    98cb5876b9eec6f9001e63232a23fd81

  • SHA1

    78ec03f83e565b912e434b4b576462900501265a

  • SHA256

    2d54c7cdd38bfaf7ceddc167d84c93a8b4ddf6553bb8fe0689fcf54bd2627438

  • SHA512

    e1673ca4d38f14e035723c569118ce9c6dd520d2f4206d74d49140ce1a1fe6f1ebb1cba4735d9a285450b384565a96228628da5f93e2b5308587920ea452a9d8

  • SSDEEP

    6144:vrdWssVvjkwIoawy206BJnBOwl+TV0kOiifNVBSKBV+UdvrEFp7hKcca:v0sUApoaylBnOFhIiifn5BjvrEH7Nt

Malware Config

Targets

    • Target

      2d54c7cdd38bfaf7ceddc167d84c93a8b4ddf6553bb8fe0689fcf54bd2627438

    • Size

      394KB

    • MD5

      98cb5876b9eec6f9001e63232a23fd81

    • SHA1

      78ec03f83e565b912e434b4b576462900501265a

    • SHA256

      2d54c7cdd38bfaf7ceddc167d84c93a8b4ddf6553bb8fe0689fcf54bd2627438

    • SHA512

      e1673ca4d38f14e035723c569118ce9c6dd520d2f4206d74d49140ce1a1fe6f1ebb1cba4735d9a285450b384565a96228628da5f93e2b5308587920ea452a9d8

    • SSDEEP

      6144:vrdWssVvjkwIoawy206BJnBOwl+TV0kOiifNVBSKBV+UdvrEFp7hKcca:v0sUApoaylBnOFhIiifn5BjvrEH7Nt

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks