General

  • Target

    e29f42d7a321d06e1d26639aa47c50f079840cd34a98486de4b56f1333958c1bN.exe

  • Size

    180KB

  • Sample

    241226-1cjvls1mgq

  • MD5

    0d6a79824a2a41ef894084c72e6bd110

  • SHA1

    2d663697f9d5946edefa158488975fc52b60df80

  • SHA256

    e29f42d7a321d06e1d26639aa47c50f079840cd34a98486de4b56f1333958c1b

  • SHA512

    ea7a4f84617240160caf07d2bce3a80ac220d10c7ca157259c3ef147471e212b948a7fb6a272abad086ff8a7d833e5e719cd6ee8ce8b987e7390621f99d31802

  • SSDEEP

    3072:DgGBF3/IiOIYGL3vD5DUxwvx2xe2lQBV+UdE+rECWp7hK+sC9Tb:EGBJAiTHj12wpBV+UdvrEFp7hKhCZ

Malware Config

Targets

    • Target

      e29f42d7a321d06e1d26639aa47c50f079840cd34a98486de4b56f1333958c1bN.exe

    • Size

      180KB

    • MD5

      0d6a79824a2a41ef894084c72e6bd110

    • SHA1

      2d663697f9d5946edefa158488975fc52b60df80

    • SHA256

      e29f42d7a321d06e1d26639aa47c50f079840cd34a98486de4b56f1333958c1b

    • SHA512

      ea7a4f84617240160caf07d2bce3a80ac220d10c7ca157259c3ef147471e212b948a7fb6a272abad086ff8a7d833e5e719cd6ee8ce8b987e7390621f99d31802

    • SSDEEP

      3072:DgGBF3/IiOIYGL3vD5DUxwvx2xe2lQBV+UdE+rECWp7hK+sC9Tb:EGBJAiTHj12wpBV+UdvrEFp7hKhCZ

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks