General

  • Target

    bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8

  • Size

    243KB

  • Sample

    241228-r4jt9aymat

  • MD5

    a7a5f35e352d552a1f66a1cd8a9a238b

  • SHA1

    a41536fd46580c1b736386a460fa2b956627cea9

  • SHA256

    bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8

  • SHA512

    d94ca2424132446adf49653837ef383cb907fcbd484e8e535d6db0f4c26604637dccb4c750d2bf4ad28727bb73af5eeb16b22acff4fc03970b84cc7e4b1e9814

  • SSDEEP

    3072:ewzvOYNa5lRvT/DvbEvK9aobNI2B+DlIH3angqtirxzGlB89Vo6FoCG55lO/X9up:1aTFh9H/B+3ChmBV+UdvrEFp7hKp

Malware Config

Targets

    • Target

      bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8

    • Size

      243KB

    • MD5

      a7a5f35e352d552a1f66a1cd8a9a238b

    • SHA1

      a41536fd46580c1b736386a460fa2b956627cea9

    • SHA256

      bf4b735c910a9f82b0f13025e9e6e5695669ad4a62bc057977cf068f8b1bc2a8

    • SHA512

      d94ca2424132446adf49653837ef383cb907fcbd484e8e535d6db0f4c26604637dccb4c750d2bf4ad28727bb73af5eeb16b22acff4fc03970b84cc7e4b1e9814

    • SSDEEP

      3072:ewzvOYNa5lRvT/DvbEvK9aobNI2B+DlIH3angqtirxzGlB89Vo6FoCG55lO/X9up:1aTFh9H/B+3ChmBV+UdvrEFp7hKp

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks