General

  • Target

    5bcadf8a368848965b78cb1e1cd5c5453df8b1f053dbea49238e2e883a7baa9bN.exe

  • Size

    519KB

  • Sample

    241225-3jpesa1naw

  • MD5

    e486ebfe698067ac758bcc2f8cd3bdf0

  • SHA1

    0cedcb9603b1782fe8f0673ca8d96f2b50d62060

  • SHA256

    5bcadf8a368848965b78cb1e1cd5c5453df8b1f053dbea49238e2e883a7baa9b

  • SHA512

    563dc2081ac8a8969b454993bf9f1780feb0747675341f196443efced0c26c9806df6fb200f8865ca5f3bdf5c3743a94d1324cd2f9b707b99e7bed03831e5a5e

  • SSDEEP

    12288:fOv5jKhsfoPA+yeVjuUCUxP4C902bdRtJJPiW40PgGTPr7BjvrEH7O:fq5TfcdPj4fmbX40dBrEH7O

Malware Config

Targets

    • Target

      5bcadf8a368848965b78cb1e1cd5c5453df8b1f053dbea49238e2e883a7baa9bN.exe

    • Size

      519KB

    • MD5

      e486ebfe698067ac758bcc2f8cd3bdf0

    • SHA1

      0cedcb9603b1782fe8f0673ca8d96f2b50d62060

    • SHA256

      5bcadf8a368848965b78cb1e1cd5c5453df8b1f053dbea49238e2e883a7baa9b

    • SHA512

      563dc2081ac8a8969b454993bf9f1780feb0747675341f196443efced0c26c9806df6fb200f8865ca5f3bdf5c3743a94d1324cd2f9b707b99e7bed03831e5a5e

    • SSDEEP

      12288:fOv5jKhsfoPA+yeVjuUCUxP4C902bdRtJJPiW40PgGTPr7BjvrEH7O:fq5TfcdPj4fmbX40dBrEH7O

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks