General

  • Target

    9ce3d61c3bae4854ee742f983d4dd70ddd460ddefd72494a56de608f32129a25

  • Size

    286KB

  • Sample

    241230-gf7ajaznbz

  • MD5

    55fd9e9b15da8c56c4eca303cc3273df

  • SHA1

    543cc65f06f0c346e75f1f8e90f8edcc91c6f950

  • SHA256

    9ce3d61c3bae4854ee742f983d4dd70ddd460ddefd72494a56de608f32129a25

  • SHA512

    c18fc11690d3937ae98f32ae2659306b6af3295f275729d3df13937ba5cb4132efc3c35574ab8f2e244d7bc983f6bcd54dae5571836edfd9cd8902b19eabf957

  • SSDEEP

    6144:j7gKNkhSR/pnuyXnZhB+h8WHlBV+UdvrEFp7hKU+:j7gKNkhm/pnuyXnPB+h8WHlBjvrEH7b+

Malware Config

Targets

    • Target

      9ce3d61c3bae4854ee742f983d4dd70ddd460ddefd72494a56de608f32129a25

    • Size

      286KB

    • MD5

      55fd9e9b15da8c56c4eca303cc3273df

    • SHA1

      543cc65f06f0c346e75f1f8e90f8edcc91c6f950

    • SHA256

      9ce3d61c3bae4854ee742f983d4dd70ddd460ddefd72494a56de608f32129a25

    • SHA512

      c18fc11690d3937ae98f32ae2659306b6af3295f275729d3df13937ba5cb4132efc3c35574ab8f2e244d7bc983f6bcd54dae5571836edfd9cd8902b19eabf957

    • SSDEEP

      6144:j7gKNkhSR/pnuyXnZhB+h8WHlBV+UdvrEFp7hKU+:j7gKNkhm/pnuyXnPB+h8WHlBjvrEH7b+

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks