General

  • Target

    914fe4dc6b544b784571fab78d32b027363790597515c55face97b2c34012bc5

  • Size

    162KB

  • Sample

    241230-hl48ss1lhn

  • MD5

    0f3f071a1870551051fd3990b73cfcb1

  • SHA1

    63cd5b94eab0ba93d03cda41b07d81203514e2e7

  • SHA256

    914fe4dc6b544b784571fab78d32b027363790597515c55face97b2c34012bc5

  • SHA512

    76bd2e10faffc0246985905294ee99bfa8471e0e3129b59a0453f544a21d7cc2c8e5178b03addb7f92a5bc15251b193e2d983cf2621fccdaf413f268ef467ec7

  • SSDEEP

    3072:GCfG7WoPRJ2xIGFn/7Cv2giznhFgrq2lQBV+UdE+rECWp7hKjbu9:GCfGdJ2Pu4/5BV+UdvrEFp7hKjbu9

Malware Config

Targets

    • Target

      914fe4dc6b544b784571fab78d32b027363790597515c55face97b2c34012bc5

    • Size

      162KB

    • MD5

      0f3f071a1870551051fd3990b73cfcb1

    • SHA1

      63cd5b94eab0ba93d03cda41b07d81203514e2e7

    • SHA256

      914fe4dc6b544b784571fab78d32b027363790597515c55face97b2c34012bc5

    • SHA512

      76bd2e10faffc0246985905294ee99bfa8471e0e3129b59a0453f544a21d7cc2c8e5178b03addb7f92a5bc15251b193e2d983cf2621fccdaf413f268ef467ec7

    • SSDEEP

      3072:GCfG7WoPRJ2xIGFn/7Cv2giznhFgrq2lQBV+UdE+rECWp7hKjbu9:GCfGdJ2Pu4/5BV+UdvrEFp7hKjbu9

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks