General

  • Target

    b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2N.exe

  • Size

    648KB

  • Sample

    250101-183ycsxnet

  • MD5

    60f72f4929966e926b8b91edf4c359f0

  • SHA1

    f9aa35728ac81c11067617d1c7c47d53a5bc4a77

  • SHA256

    b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2

  • SHA512

    b89f831e53a8efe1dab95acc6f56efb0bbc4eec8ccf451b1898b4964e3f1185532c3ce028badff46109dc59752e602b2676dd4c5ceed57eec24bbeea641e014d

  • SSDEEP

    12288:UdUE+hyihAOkwDkaoHmkN04kFMQ2p7jk7G8VsiAP7A5C2mHBjvrEH7b:UPYATIkdBRx7jkK8VsiEMmFrEH7b

Malware Config

Targets

    • Target

      b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2N.exe

    • Size

      648KB

    • MD5

      60f72f4929966e926b8b91edf4c359f0

    • SHA1

      f9aa35728ac81c11067617d1c7c47d53a5bc4a77

    • SHA256

      b786ec29ccc566c63606a2665668fc53914631926922606db7abfbbce3e699d2

    • SHA512

      b89f831e53a8efe1dab95acc6f56efb0bbc4eec8ccf451b1898b4964e3f1185532c3ce028badff46109dc59752e602b2676dd4c5ceed57eec24bbeea641e014d

    • SSDEEP

      12288:UdUE+hyihAOkwDkaoHmkN04kFMQ2p7jk7G8VsiAP7A5C2mHBjvrEH7b:UPYATIkdBRx7jkK8VsiEMmFrEH7b

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks