General

  • Target

    89d29a172b76a4c393394e561267959bf35beeb93c621a4b49e1c91144cabcadN.exe

  • Size

    485KB

  • Sample

    250104-e9dtzavjhq

  • MD5

    f58efc06d7bb0abe4b91deafc1f28d20

  • SHA1

    ce3b890cb63c4c7e6f22fc66da873165c3dc4e14

  • SHA256

    89d29a172b76a4c393394e561267959bf35beeb93c621a4b49e1c91144cabcad

  • SHA512

    6f14a0ac7753632b074fa829f6afc8a55b99e59ce3d3bbf0284a36e1e019b0705ded74780f2589173827f2f6e3621d8aa72f505b3d6174ef7048f432b05634fc

  • SSDEEP

    12288:GcRmyq/lmuaZ9WPS3tXWuCFQ8mbEDAxiNjrA5FBjvrEH7KEQhP:FmtjaZggtGuCabmVpA5rrEH7KEQt

Malware Config

Targets

    • Target

      89d29a172b76a4c393394e561267959bf35beeb93c621a4b49e1c91144cabcadN.exe

    • Size

      485KB

    • MD5

      f58efc06d7bb0abe4b91deafc1f28d20

    • SHA1

      ce3b890cb63c4c7e6f22fc66da873165c3dc4e14

    • SHA256

      89d29a172b76a4c393394e561267959bf35beeb93c621a4b49e1c91144cabcad

    • SHA512

      6f14a0ac7753632b074fa829f6afc8a55b99e59ce3d3bbf0284a36e1e019b0705ded74780f2589173827f2f6e3621d8aa72f505b3d6174ef7048f432b05634fc

    • SSDEEP

      12288:GcRmyq/lmuaZ9WPS3tXWuCFQ8mbEDAxiNjrA5FBjvrEH7KEQhP:FmtjaZggtGuCabmVpA5rrEH7KEQt

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks