General

  • Target

    8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0

  • Size

    808KB

  • Sample

    250105-ct3gaazqdn

  • MD5

    16b82725b35e1ce2c13e84d08017733e

  • SHA1

    a263e643783efd9ad40f47e7e2edab9ce7d2b2c9

  • SHA256

    8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0

  • SHA512

    86752202c82f1e832a9fd9215c28db1618e2878d095a0ed9df55cbda231746f84f097eabc7063ef6738476a81ab13b4aa99e7f0cd9137c7ee69258c15dd3aa64

  • SSDEEP

    12288:MJKC9XsK2SYNPG2Nl4ySBCGdo6hcXBW3CMYxHwALEQ2BjvrEH7V:LRPNl4yh8DhcXBW3CM4rgrEH7V

Malware Config

Targets

    • Target

      8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0

    • Size

      808KB

    • MD5

      16b82725b35e1ce2c13e84d08017733e

    • SHA1

      a263e643783efd9ad40f47e7e2edab9ce7d2b2c9

    • SHA256

      8ff03832aaf9a0f8e82273ab17ee5c23ccc309867e0e3e107207e749daf0e9f0

    • SHA512

      86752202c82f1e832a9fd9215c28db1618e2878d095a0ed9df55cbda231746f84f097eabc7063ef6738476a81ab13b4aa99e7f0cd9137c7ee69258c15dd3aa64

    • SSDEEP

      12288:MJKC9XsK2SYNPG2Nl4ySBCGdo6hcXBW3CMYxHwALEQ2BjvrEH7V:LRPNl4yh8DhcXBW3CM4rgrEH7V

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks