General

  • Target

    37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3N.exe

  • Size

    884KB

  • Sample

    250104-pwjs6szkgt

  • MD5

    a8272a4e210192fbfb8a5140673d0af0

  • SHA1

    79feef12c88e9ba5d93f9b30b5e704249cb8d853

  • SHA256

    37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3

  • SHA512

    2004e76f1c3053765129ea4863e992334c313ff530cea3ac8e201b9511e5951514164a86dcdd9fc6328badf9ed89de333902a1aa2ca68a31d6101f15b7a483a3

  • SSDEEP

    24576:XXAhvvPPHMQCwrK7NUCDZnmiS7/4zNMjrEH7z4:g9zCw+7Nl1na7/0yV

Malware Config

Targets

    • Target

      37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3N.exe

    • Size

      884KB

    • MD5

      a8272a4e210192fbfb8a5140673d0af0

    • SHA1

      79feef12c88e9ba5d93f9b30b5e704249cb8d853

    • SHA256

      37993d0c67f5df654f9f2ddb8561e540e717fa658b1099084144619dfc92b5b3

    • SHA512

      2004e76f1c3053765129ea4863e992334c313ff530cea3ac8e201b9511e5951514164a86dcdd9fc6328badf9ed89de333902a1aa2ca68a31d6101f15b7a483a3

    • SSDEEP

      24576:XXAhvvPPHMQCwrK7NUCDZnmiS7/4zNMjrEH7z4:g9zCw+7Nl1na7/0yV

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks