General

  • Target

    6422c665c0f6a6c590800a2340356efd3edbfc077d432dc1388dbb68ee041db1

  • Size

    156KB

  • Sample

    241229-3gtayszqbm

  • MD5

    e72fe046e8cd0e9fffa83a098ec8e163

  • SHA1

    4196aa603df872d6ca9ed55834f5e6b6ad86292d

  • SHA256

    6422c665c0f6a6c590800a2340356efd3edbfc077d432dc1388dbb68ee041db1

  • SHA512

    b4bc4b27d7845811ba99f41867e006dfe4a6ca61a04f4fcb0d88e6742576d0999b9e1aa7fea1de1919f96091611420985c67cee3738bed7ea91eb04d64bbba8d

  • SSDEEP

    3072:kiyCsqQj5Jf22lQBV+UdE+rECWp7hKSLA:kiykQABV+UdvrEFp7hK9

Malware Config

Targets

    • Target

      6422c665c0f6a6c590800a2340356efd3edbfc077d432dc1388dbb68ee041db1

    • Size

      156KB

    • MD5

      e72fe046e8cd0e9fffa83a098ec8e163

    • SHA1

      4196aa603df872d6ca9ed55834f5e6b6ad86292d

    • SHA256

      6422c665c0f6a6c590800a2340356efd3edbfc077d432dc1388dbb68ee041db1

    • SHA512

      b4bc4b27d7845811ba99f41867e006dfe4a6ca61a04f4fcb0d88e6742576d0999b9e1aa7fea1de1919f96091611420985c67cee3738bed7ea91eb04d64bbba8d

    • SSDEEP

      3072:kiyCsqQj5Jf22lQBV+UdE+rECWp7hKSLA:kiykQABV+UdvrEFp7hK9

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks