General

  • Target

    422645839d0cd93030f6c44292cd8dea0757379d157b49abbbea91080d1afcabN.exe

  • Size

    1.2MB

  • Sample

    250104-s6q7sawjdy

  • MD5

    8c3978a16bcad26e0c26ca69c1bc9f50

  • SHA1

    3c6177c97bb8a1232d49111625d0fed5edef45e1

  • SHA256

    422645839d0cd93030f6c44292cd8dea0757379d157b49abbbea91080d1afcab

  • SHA512

    34cc81d3aaaea48c61f9ada775fe320fd9fccc545955603fb972fb52944f439dc18190c7a2f0a6ac4270acacd9141218e130c6319dac6872e6bd8d30e00ed5f6

  • SSDEEP

    24576:p2brn/kG9Pwrn/POzMQGEvGH3RDDtAi1PDxwQo79mRUwbSlcfSgQ+n81TrEH7e:porn/x9Pwrn/POzMQGEvGHtDtN1dwQXq

Malware Config

Targets

    • Target

      422645839d0cd93030f6c44292cd8dea0757379d157b49abbbea91080d1afcabN.exe

    • Size

      1.2MB

    • MD5

      8c3978a16bcad26e0c26ca69c1bc9f50

    • SHA1

      3c6177c97bb8a1232d49111625d0fed5edef45e1

    • SHA256

      422645839d0cd93030f6c44292cd8dea0757379d157b49abbbea91080d1afcab

    • SHA512

      34cc81d3aaaea48c61f9ada775fe320fd9fccc545955603fb972fb52944f439dc18190c7a2f0a6ac4270acacd9141218e130c6319dac6872e6bd8d30e00ed5f6

    • SSDEEP

      24576:p2brn/kG9Pwrn/POzMQGEvGH3RDDtAi1PDxwQo79mRUwbSlcfSgQ+n81TrEH7e:porn/x9Pwrn/POzMQGEvGHtDtN1dwQXq

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Modifies WinLogon for persistence

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks