General

  • Target

    645d6b986cb08ecae7e759e619c6344b823d6b3d0d10faa0e7ba70c0f1396a57

  • Size

    440KB

  • Sample

    241229-2mc1gsyqay

  • MD5

    416dc96bfb96eda69301944619a3dde4

  • SHA1

    1391c94fb89d841063ba4a98f394e2193ac600ac

  • SHA256

    645d6b986cb08ecae7e759e619c6344b823d6b3d0d10faa0e7ba70c0f1396a57

  • SHA512

    57cc1bb400e4f9c0dc7ea106501f3ab03c79bb830307b3fc511fa72597733c7fe089dcd66e776ff690783ce081c61c932c15bd1a02bec02554aa15455b1f6db6

  • SSDEEP

    12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSebrw8xHgbYpjE8NO0qwxeWfF02/S0lqJx:+eli+Z0DvfeUYqcZQCGm4YprEH7i1

Malware Config

Targets

    • Target

      645d6b986cb08ecae7e759e619c6344b823d6b3d0d10faa0e7ba70c0f1396a57

    • Size

      440KB

    • MD5

      416dc96bfb96eda69301944619a3dde4

    • SHA1

      1391c94fb89d841063ba4a98f394e2193ac600ac

    • SHA256

      645d6b986cb08ecae7e759e619c6344b823d6b3d0d10faa0e7ba70c0f1396a57

    • SHA512

      57cc1bb400e4f9c0dc7ea106501f3ab03c79bb830307b3fc511fa72597733c7fe089dcd66e776ff690783ce081c61c932c15bd1a02bec02554aa15455b1f6db6

    • SSDEEP

      12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSebrw8xHgbYpjE8NO0qwxeWfF02/S0lqJx:+eli+Z0DvfeUYqcZQCGm4YprEH7i1

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks