General

  • Target

    943e2c2bdefb076c3254577dcd0a27031e6ef89a031cc5c5fa392e64057638d5N.exe

  • Size

    356KB

  • Sample

    241231-pm5z2sspap

  • MD5

    efc6f5710d259d52985d7123bd2a3520

  • SHA1

    dd5ca17eb95b98d2dfac84ed419f6e9e6bd91956

  • SHA256

    943e2c2bdefb076c3254577dcd0a27031e6ef89a031cc5c5fa392e64057638d5

  • SHA512

    8c76e10040a844f3afd38ca606df7067759bdedcf2f9fd6f61de6e5b86312ed9189bc3b4254f7577e47974c4a6cad02e7ce0be4296e22337d22fca0b4896a0ce

  • SSDEEP

    6144:ZWy71bY6Jb6Cgid1xEWvNMcAO8guQ40G7HEgXUq7KWFQHBV+UdvrEFp7hKQ:Zv7LzxOO8gXGLEgEqnQHBjvrEH7z

Malware Config

Targets

    • Target

      943e2c2bdefb076c3254577dcd0a27031e6ef89a031cc5c5fa392e64057638d5N.exe

    • Size

      356KB

    • MD5

      efc6f5710d259d52985d7123bd2a3520

    • SHA1

      dd5ca17eb95b98d2dfac84ed419f6e9e6bd91956

    • SHA256

      943e2c2bdefb076c3254577dcd0a27031e6ef89a031cc5c5fa392e64057638d5

    • SHA512

      8c76e10040a844f3afd38ca606df7067759bdedcf2f9fd6f61de6e5b86312ed9189bc3b4254f7577e47974c4a6cad02e7ce0be4296e22337d22fca0b4896a0ce

    • SSDEEP

      6144:ZWy71bY6Jb6Cgid1xEWvNMcAO8guQ40G7HEgXUq7KWFQHBV+UdvrEFp7hKQ:Zv7LzxOO8gXGLEgEqnQHBjvrEH7z

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks