General

  • Target

    8a290a86ab33f74dc29f126c6bb78a4af75ddfba70f2f8eff48e6724cf699da7N.exe

  • Size

    144KB

  • Sample

    250102-a6xepatpdx

  • MD5

    1f495e35e2a6a10f176554753c90f140

  • SHA1

    60adb78c63c57a3cc1ee4a33f33642b1f57c8637

  • SHA256

    8a290a86ab33f74dc29f126c6bb78a4af75ddfba70f2f8eff48e6724cf699da7

  • SHA512

    b3c5ee0853b0ddd22292cdd0a08b4ff0ff8a1f2e6c804962c9e9b0ceaf4bb216a2b2dd79d92928405d09395c0a69cb8ca06eeb17d35d1aae1565d4bdc5cb59b2

  • SSDEEP

    3072:alZqpbNp3/tB2FzW2lQBV+UdE+rECWp7hKWrGyM:alZqpBpPQQBV+UdvrEFp7hKWr6

Malware Config

Targets

    • Target

      8a290a86ab33f74dc29f126c6bb78a4af75ddfba70f2f8eff48e6724cf699da7N.exe

    • Size

      144KB

    • MD5

      1f495e35e2a6a10f176554753c90f140

    • SHA1

      60adb78c63c57a3cc1ee4a33f33642b1f57c8637

    • SHA256

      8a290a86ab33f74dc29f126c6bb78a4af75ddfba70f2f8eff48e6724cf699da7

    • SHA512

      b3c5ee0853b0ddd22292cdd0a08b4ff0ff8a1f2e6c804962c9e9b0ceaf4bb216a2b2dd79d92928405d09395c0a69cb8ca06eeb17d35d1aae1565d4bdc5cb59b2

    • SSDEEP

      3072:alZqpbNp3/tB2FzW2lQBV+UdE+rECWp7hKWrGyM:alZqpBpPQQBV+UdvrEFp7hKWr6

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks