General

  • Target

    09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba

  • Size

    313KB

  • Sample

    250104-yctzgawjgq

  • MD5

    3e23d56e5ced25d69b67735acb9ec044

  • SHA1

    68b4163fade128741c2954579c5b2bc5ca17b6c2

  • SHA256

    09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba

  • SHA512

    4570b509f66b67c1b1b234d66415456435040c2b6992aa8c0359c47ac984f245be72007f5739f56c0c11beabe69f3a6091821869f4fbf7da372216653d77fb2b

  • SSDEEP

    6144:UsLqdufVUNDaPxdk1cWQRNTBSNBV+UdvrEFp7hKjKp1:PFUNDaPQv0NT0NBjvrEH7+8

Malware Config

Targets

    • Target

      09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba

    • Size

      313KB

    • MD5

      3e23d56e5ced25d69b67735acb9ec044

    • SHA1

      68b4163fade128741c2954579c5b2bc5ca17b6c2

    • SHA256

      09d0091bc0b4c65936e61195b2de83969f3be69bf404a9e9a7fe98148406bdba

    • SHA512

      4570b509f66b67c1b1b234d66415456435040c2b6992aa8c0359c47ac984f245be72007f5739f56c0c11beabe69f3a6091821869f4fbf7da372216653d77fb2b

    • SSDEEP

      6144:UsLqdufVUNDaPxdk1cWQRNTBSNBV+UdvrEFp7hKjKp1:PFUNDaPQv0NT0NBjvrEH7+8

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Modifies visiblity of hidden/system files in Explorer

    • Detects Floxif payload

    • Modifies Windows Firewall

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies Security services

      Modifies the startup behavior of a security service.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks