General

  • Target

    4b377a3613df27ee4b6227d88ab6979dd4388967f43d1db911aed820a73372d8

  • Size

    962KB

  • Sample

    250102-2l8qrsylaz

  • MD5

    0b1017c9fb3332384dc262ace8045c64

  • SHA1

    bb569217eb2ec5cfeac26dbc686911a7a37c9375

  • SHA256

    4b377a3613df27ee4b6227d88ab6979dd4388967f43d1db911aed820a73372d8

  • SHA512

    be1058cb4b2bf3a8fbfe2200dcbd26c76b5956a5f3ebf3640af7162e257e562ea68cfaa8539d1db15b7639f74ee26f1c33e772d88a9db3a3a298b014ae24c426

  • SSDEEP

    24576:bqNAogNi7/VMjAA4LVL8pJsv6tWKFdu9CcuuKTr9zORCrEH7B:GEiRMEb9GJsv6tWKFdu9CtuKTJzs

Malware Config

Targets

    • Target

      4b377a3613df27ee4b6227d88ab6979dd4388967f43d1db911aed820a73372d8

    • Size

      962KB

    • MD5

      0b1017c9fb3332384dc262ace8045c64

    • SHA1

      bb569217eb2ec5cfeac26dbc686911a7a37c9375

    • SHA256

      4b377a3613df27ee4b6227d88ab6979dd4388967f43d1db911aed820a73372d8

    • SHA512

      be1058cb4b2bf3a8fbfe2200dcbd26c76b5956a5f3ebf3640af7162e257e562ea68cfaa8539d1db15b7639f74ee26f1c33e772d88a9db3a3a298b014ae24c426

    • SSDEEP

      24576:bqNAogNi7/VMjAA4LVL8pJsv6tWKFdu9CcuuKTr9zORCrEH7B:GEiRMEb9GJsv6tWKFdu9CtuKTJzs

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks