General

  • Target

    e8d6ab59f506a8a6a5adfe7082e1c31c9577f68ca7f2cf3d4f39b0d7eae2ff9a

  • Size

    2.2MB

  • Sample

    241225-s8f5laxke1

  • MD5

    d272d18143877dc01ded5ed8e1d65546

  • SHA1

    a5c2c6d03d3877532f07d831d3ca9bb81cb92711

  • SHA256

    e8d6ab59f506a8a6a5adfe7082e1c31c9577f68ca7f2cf3d4f39b0d7eae2ff9a

  • SHA512

    d3ae9487eccf2a11f516c32f6073ce4e98f038aa7a8cc17a3a06b7395f7f319830d6159093304ff8ffecf0369d41e77c287c9162ca644dcad0a0b27195148e81

  • SSDEEP

    49152:hc3xMF+p9fYbWZgIjHcFej+Wm/QyHiDH3HrTHgHoHiH/HOHHVPFrDzjtRrmwhpwy:yR3YbMa08dcBbGZrdJEY9vwJ6WJeIUq

Malware Config

Targets

    • Target

      e8d6ab59f506a8a6a5adfe7082e1c31c9577f68ca7f2cf3d4f39b0d7eae2ff9a

    • Size

      2.2MB

    • MD5

      d272d18143877dc01ded5ed8e1d65546

    • SHA1

      a5c2c6d03d3877532f07d831d3ca9bb81cb92711

    • SHA256

      e8d6ab59f506a8a6a5adfe7082e1c31c9577f68ca7f2cf3d4f39b0d7eae2ff9a

    • SHA512

      d3ae9487eccf2a11f516c32f6073ce4e98f038aa7a8cc17a3a06b7395f7f319830d6159093304ff8ffecf0369d41e77c287c9162ca644dcad0a0b27195148e81

    • SSDEEP

      49152:hc3xMF+p9fYbWZgIjHcFej+Wm/QyHiDH3HrTHgHoHiH/HOHHVPFrDzjtRrmwhpwy:yR3YbMa08dcBbGZrdJEY9vwJ6WJeIUq

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks