General

  • Target

    33d31c3a3cc991b7a7e5e640c397c5731fbb3a81178bf24fc6d79d3b2f2d19d7

  • Size

    562KB

  • Sample

    241230-ggjkvsznc1

  • MD5

    4954d97c03c5388fee70d218cbd0cf14

  • SHA1

    e86fc1b2da8da5c1e1af8ef2fbece5ccdcaa0a2b

  • SHA256

    33d31c3a3cc991b7a7e5e640c397c5731fbb3a81178bf24fc6d79d3b2f2d19d7

  • SHA512

    e267e44d0768074d673259a633b9350283e12822cf32418c3e2a51b96f44c0f6fd7c8d2220da3c22ddbba5e32b713d1b098a3793305c0197e460f366fa57bffb

  • SSDEEP

    12288:SnR+T6jdSeoOjH7wEGA4iuSlvdGHBjvrEH7HB:SnR+T6BSe/77OXivd4rEH7HB

Malware Config

Targets

    • Target

      33d31c3a3cc991b7a7e5e640c397c5731fbb3a81178bf24fc6d79d3b2f2d19d7

    • Size

      562KB

    • MD5

      4954d97c03c5388fee70d218cbd0cf14

    • SHA1

      e86fc1b2da8da5c1e1af8ef2fbece5ccdcaa0a2b

    • SHA256

      33d31c3a3cc991b7a7e5e640c397c5731fbb3a81178bf24fc6d79d3b2f2d19d7

    • SHA512

      e267e44d0768074d673259a633b9350283e12822cf32418c3e2a51b96f44c0f6fd7c8d2220da3c22ddbba5e32b713d1b098a3793305c0197e460f366fa57bffb

    • SSDEEP

      12288:SnR+T6jdSeoOjH7wEGA4iuSlvdGHBjvrEH7HB:SnR+T6BSe/77OXivd4rEH7HB

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks