General

  • Target

    7586596643d56c53111f64092879acaa50a0cf5f515e831d8b6b5066997ef65bN.exe

  • Size

    694KB

  • Sample

    241225-26mc9s1ngq

  • MD5

    cff959b45466c61c5bbca44718b26a80

  • SHA1

    abd7b01a895b68bc02f56dc812790978ab7c03ce

  • SHA256

    7586596643d56c53111f64092879acaa50a0cf5f515e831d8b6b5066997ef65b

  • SHA512

    ff16bce0611dabf5a758034fc5add633dd9f1998f620dfe23bdf9c3031af83f708b21f25bee645f91f568d9d992c398ebb0491f44cb120a20983b4f8997e8941

  • SSDEEP

    12288:TeiJQ3Yb4dOtEp6zB9wtAYjBxqDseqZfKaX0vWAezbBjvrEH7P:KiJMYb4dw9QtB0D0ZfVX0ujrEH7P

Malware Config

Targets

    • Target

      7586596643d56c53111f64092879acaa50a0cf5f515e831d8b6b5066997ef65bN.exe

    • Size

      694KB

    • MD5

      cff959b45466c61c5bbca44718b26a80

    • SHA1

      abd7b01a895b68bc02f56dc812790978ab7c03ce

    • SHA256

      7586596643d56c53111f64092879acaa50a0cf5f515e831d8b6b5066997ef65b

    • SHA512

      ff16bce0611dabf5a758034fc5add633dd9f1998f620dfe23bdf9c3031af83f708b21f25bee645f91f568d9d992c398ebb0491f44cb120a20983b4f8997e8941

    • SSDEEP

      12288:TeiJQ3Yb4dOtEp6zB9wtAYjBxqDseqZfKaX0vWAezbBjvrEH7P:KiJMYb4dw9QtB0D0ZfVX0ujrEH7P

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks