General

  • Target

    0c7327804fe50c5c29fa43b70458201b99f22d3dd759f3f21b1b1edcb08c3566N.exe

  • Size

    4.0MB

  • Sample

    250102-bbm37svjax

  • MD5

    4a790c625fdacd05222a4e9cda95d030

  • SHA1

    b13861ad929271e2987f8006ae4f4e7ed33dc7eb

  • SHA256

    0c7327804fe50c5c29fa43b70458201b99f22d3dd759f3f21b1b1edcb08c3566

  • SHA512

    604946a5baf29f7a6434c063426b72b66c36dea50c1ffe86f5775407217f42f25a388de33b8b64e11fa596121006366744d790c92674340779323db8ff16d0b8

  • SSDEEP

    98304:dNRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAT:zR/gmeOqv7Ac9F0kl

Malware Config

Targets

    • Target

      0c7327804fe50c5c29fa43b70458201b99f22d3dd759f3f21b1b1edcb08c3566N.exe

    • Size

      4.0MB

    • MD5

      4a790c625fdacd05222a4e9cda95d030

    • SHA1

      b13861ad929271e2987f8006ae4f4e7ed33dc7eb

    • SHA256

      0c7327804fe50c5c29fa43b70458201b99f22d3dd759f3f21b1b1edcb08c3566

    • SHA512

      604946a5baf29f7a6434c063426b72b66c36dea50c1ffe86f5775407217f42f25a388de33b8b64e11fa596121006366744d790c92674340779323db8ff16d0b8

    • SSDEEP

      98304:dNRBOBfKgQIm9EOTqw8vjh9Ac9nUNupK4hVvcF+yHrAT:zR/gmeOqv7Ac9F0kl

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Modifies visiblity of hidden/system files in Explorer

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks