General

  • Target

    44a8c9c0d52dd54e13559237a0e355ed106e9368db1db5dac579f971065d995aN.exe

  • Size

    671KB

  • Sample

    241231-vr2q3szqdv

  • MD5

    09b9bb98de6b332dc3f24a3716e1e200

  • SHA1

    42a2fff6f9128f4f455ca80b1b4fe5d98e42f36b

  • SHA256

    44a8c9c0d52dd54e13559237a0e355ed106e9368db1db5dac579f971065d995a

  • SHA512

    eafe6bcec569097ab417d59286d9463faef6325a9de37e27fc1e5e0607af845f24588df80cb2d4cf70b76b9060924cebabef7fba0ff8ce843b60ed047c1129a2

  • SSDEEP

    12288:Cm004ZpqVpP0uoODHYStSaO4/Yt0jYize5uPwsdODjGrn9BjvrEH7U:0IPbo//4/20MizOuPNOWrnTrEH7U

Malware Config

Targets

    • Target

      44a8c9c0d52dd54e13559237a0e355ed106e9368db1db5dac579f971065d995aN.exe

    • Size

      671KB

    • MD5

      09b9bb98de6b332dc3f24a3716e1e200

    • SHA1

      42a2fff6f9128f4f455ca80b1b4fe5d98e42f36b

    • SHA256

      44a8c9c0d52dd54e13559237a0e355ed106e9368db1db5dac579f971065d995a

    • SHA512

      eafe6bcec569097ab417d59286d9463faef6325a9de37e27fc1e5e0607af845f24588df80cb2d4cf70b76b9060924cebabef7fba0ff8ce843b60ed047c1129a2

    • SSDEEP

      12288:Cm004ZpqVpP0uoODHYStSaO4/Yt0jYize5uPwsdODjGrn9BjvrEH7U:0IPbo//4/20MizOuPNOWrnTrEH7U

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks