General

  • Target

    ddf4b8fea5909ea54fc7f60038cc4e9b4ddc2deca44f69e63154c47ab031b5ad

  • Size

    1.9MB

  • Sample

    241230-hnjd4s1mcw

  • MD5

    5c924a328aec80bd0de6786d692c6192

  • SHA1

    bbfb45ba94dd46aed2f44fed1495bdb79706d25d

  • SHA256

    ddf4b8fea5909ea54fc7f60038cc4e9b4ddc2deca44f69e63154c47ab031b5ad

  • SHA512

    b0ea45439920062f77756838917dd97bfa5d146d2512a616c5fbc8870d3599c0f7941b36de5c846c9e3869b544d4c2c633ea617fd0dd1528d94c6f52799eb18e

  • SSDEEP

    49152:W4DO9VIQy1sEajFlXGcyWakK7Zyv27mf8V:W4DO9yv1sEajFFRrakK7Zyvw

Malware Config

Targets

    • Target

      ddf4b8fea5909ea54fc7f60038cc4e9b4ddc2deca44f69e63154c47ab031b5ad

    • Size

      1.9MB

    • MD5

      5c924a328aec80bd0de6786d692c6192

    • SHA1

      bbfb45ba94dd46aed2f44fed1495bdb79706d25d

    • SHA256

      ddf4b8fea5909ea54fc7f60038cc4e9b4ddc2deca44f69e63154c47ab031b5ad

    • SHA512

      b0ea45439920062f77756838917dd97bfa5d146d2512a616c5fbc8870d3599c0f7941b36de5c846c9e3869b544d4c2c633ea617fd0dd1528d94c6f52799eb18e

    • SSDEEP

      49152:W4DO9VIQy1sEajFlXGcyWakK7Zyv27mf8V:W4DO9yv1sEajFFRrakK7Zyvw

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks