General

  • Target

    57c1d65664174d84e109f7ebfa65908107f0ad2c8789b74d6a9f956a808374bbN.exe

  • Size

    1.6MB

  • Sample

    241230-3hda5atngj

  • MD5

    8c973dc29cb35dd35b5544667d99fb90

  • SHA1

    ee9f80404a68ebc4161980ab1f39e8e7ead691e2

  • SHA256

    57c1d65664174d84e109f7ebfa65908107f0ad2c8789b74d6a9f956a808374bb

  • SHA512

    b9e51ae146aaacf119adf89336eb4716fe8c5f500d47586cb4ab543f0e4f0122859b1dd0c4c83108d2a714f4f55c148c799c4b38039d7ec53b03da039bfd9c28

  • SSDEEP

    24576:RUolrU/JboM0lEglm2nNPYs/9WEy5gCkIurDsD7eXGzLervxqA9vrEH7o:dl4/BvOvm2nhL/9XyGDsD7SGzLezUW

Malware Config

Targets

    • Target

      57c1d65664174d84e109f7ebfa65908107f0ad2c8789b74d6a9f956a808374bbN.exe

    • Size

      1.6MB

    • MD5

      8c973dc29cb35dd35b5544667d99fb90

    • SHA1

      ee9f80404a68ebc4161980ab1f39e8e7ead691e2

    • SHA256

      57c1d65664174d84e109f7ebfa65908107f0ad2c8789b74d6a9f956a808374bb

    • SHA512

      b9e51ae146aaacf119adf89336eb4716fe8c5f500d47586cb4ab543f0e4f0122859b1dd0c4c83108d2a714f4f55c148c799c4b38039d7ec53b03da039bfd9c28

    • SSDEEP

      24576:RUolrU/JboM0lEglm2nNPYs/9WEy5gCkIurDsD7eXGzLervxqA9vrEH7o:dl4/BvOvm2nhL/9XyGDsD7SGzLezUW

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks