General

  • Target

    fa1ed85afdfddfaeafa0b54da1795821fddec26e58e71f4cb652c4dea19c3feb

  • Size

    500KB

  • Sample

    250104-j377fs1kgz

  • MD5

    f8c189eeeaf7ab41c39e09a52073a8fb

  • SHA1

    8c6898cf70fd5061d7648568dd63ce7891912a7c

  • SHA256

    fa1ed85afdfddfaeafa0b54da1795821fddec26e58e71f4cb652c4dea19c3feb

  • SHA512

    1e760e75e6a179f6b0d50f53e547ed5a04b4901c90c76b8699cffa05ae5529f67a298912fb485a36831b464005b31c8598608254467f262310321d63cffa429b

  • SSDEEP

    6144:RbKtrlBCZyxyQyxyYyxy0yxyTOSBy8aGTd05BV+UdvrEFp7hKyes:ItE5J5BjvrEH7d

Malware Config

Targets

    • Target

      fa1ed85afdfddfaeafa0b54da1795821fddec26e58e71f4cb652c4dea19c3feb

    • Size

      500KB

    • MD5

      f8c189eeeaf7ab41c39e09a52073a8fb

    • SHA1

      8c6898cf70fd5061d7648568dd63ce7891912a7c

    • SHA256

      fa1ed85afdfddfaeafa0b54da1795821fddec26e58e71f4cb652c4dea19c3feb

    • SHA512

      1e760e75e6a179f6b0d50f53e547ed5a04b4901c90c76b8699cffa05ae5529f67a298912fb485a36831b464005b31c8598608254467f262310321d63cffa429b

    • SSDEEP

      6144:RbKtrlBCZyxyQyxyYyxy0yxyTOSBy8aGTd05BV+UdvrEFp7hKyes:ItE5J5BjvrEH7d

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Blocklisted process makes network request

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks