General

  • Target

    0ad0b5cc36d56f0c94b984829c13890184ac8422d871dfcbd902d5f9c6f55960N.exe

  • Size

    2.2MB

  • Sample

    250103-pna63atmcy

  • MD5

    2bb5d9febb28eacd5d4ffdb6dc4c50c0

  • SHA1

    9e2ca2fb63f5f59adf3abcfb3672d9849fd6fb36

  • SHA256

    0ad0b5cc36d56f0c94b984829c13890184ac8422d871dfcbd902d5f9c6f55960

  • SHA512

    53945e3ddbbcdd5a92ada98992fb19c4f4d17c8e0d032139f6c42c1b80dfee8e40ecfefe277ae01848a49548f93c48b54f74bf2772524b192b62b862b6dcf81f

  • SSDEEP

    49152:l4kpdXw1Wa7O6MeCOL9hfV2TIdKiJv81q4:O/166MeCOL9H8iyU4

Malware Config

Targets

    • Target

      0ad0b5cc36d56f0c94b984829c13890184ac8422d871dfcbd902d5f9c6f55960N.exe

    • Size

      2.2MB

    • MD5

      2bb5d9febb28eacd5d4ffdb6dc4c50c0

    • SHA1

      9e2ca2fb63f5f59adf3abcfb3672d9849fd6fb36

    • SHA256

      0ad0b5cc36d56f0c94b984829c13890184ac8422d871dfcbd902d5f9c6f55960

    • SHA512

      53945e3ddbbcdd5a92ada98992fb19c4f4d17c8e0d032139f6c42c1b80dfee8e40ecfefe277ae01848a49548f93c48b54f74bf2772524b192b62b862b6dcf81f

    • SSDEEP

      49152:l4kpdXw1Wa7O6MeCOL9hfV2TIdKiJv81q4:O/166MeCOL9H8iyU4

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks