General

  • Target

    cd815791fd1eb8848f80fbed218eee2b528c318a8ae0e4f47352ab67208f51b2N.exe

  • Size

    672KB

  • Sample

    241226-d23yfswjgv

  • MD5

    9bb5209a5492fb2cf086526a3531a410

  • SHA1

    56844c3775e2e6f8c18c2cdb444e6ca623710d4a

  • SHA256

    cd815791fd1eb8848f80fbed218eee2b528c318a8ae0e4f47352ab67208f51b2

  • SHA512

    7b242b38132d0c851cf1d343901ce8020c0c574e6d94c01bd9e3d4d5775e24a77ddaa98f8f22ac33b5aabb1bb1e301651ae390556bc3ef527a1031f4694eb0de

  • SSDEEP

    12288:uYV6MorX7qO+C3QHO9FQVHPF51jgcE7px7r5UBzzhB1CZHxx9jLkc/VABjvrEH7I:NBd9HGaVHjFCZX9z/VirEH7I

Malware Config

Targets

    • Target

      cd815791fd1eb8848f80fbed218eee2b528c318a8ae0e4f47352ab67208f51b2N.exe

    • Size

      672KB

    • MD5

      9bb5209a5492fb2cf086526a3531a410

    • SHA1

      56844c3775e2e6f8c18c2cdb444e6ca623710d4a

    • SHA256

      cd815791fd1eb8848f80fbed218eee2b528c318a8ae0e4f47352ab67208f51b2

    • SHA512

      7b242b38132d0c851cf1d343901ce8020c0c574e6d94c01bd9e3d4d5775e24a77ddaa98f8f22ac33b5aabb1bb1e301651ae390556bc3ef527a1031f4694eb0de

    • SSDEEP

      12288:uYV6MorX7qO+C3QHO9FQVHPF51jgcE7px7r5UBzzhB1CZHxx9jLkc/VABjvrEH7I:NBd9HGaVHjFCZX9z/VirEH7I

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks