General

  • Target

    8a1ac76e15a12137fe8cc6a40447c7a8d70d728837d49b776805166cdb5187f4

  • Size

    286KB

  • Sample

    250105-e67mwatpfj

  • MD5

    75896dcdb0f0a4406581111b3b952f1f

  • SHA1

    c6ff01db63bbf00bcd23348ed8f54f31a221ffe6

  • SHA256

    8a1ac76e15a12137fe8cc6a40447c7a8d70d728837d49b776805166cdb5187f4

  • SHA512

    4634f4c56b0959896be1391cac3341b965f36ae9fdaeea3e454c687e02d066677024ba24ce773ef6ca7c05c378419b23a1ff791082d1281a1db4d2ed8f39af9d

  • SSDEEP

    6144:g7gKd35kHouyXnZhB+R8WHqBV+UdvrEFp7hKNm:g7gKd3JuyXnPB+R8WHqBjvrEH7Wm

Malware Config

Targets

    • Target

      8a1ac76e15a12137fe8cc6a40447c7a8d70d728837d49b776805166cdb5187f4

    • Size

      286KB

    • MD5

      75896dcdb0f0a4406581111b3b952f1f

    • SHA1

      c6ff01db63bbf00bcd23348ed8f54f31a221ffe6

    • SHA256

      8a1ac76e15a12137fe8cc6a40447c7a8d70d728837d49b776805166cdb5187f4

    • SHA512

      4634f4c56b0959896be1391cac3341b965f36ae9fdaeea3e454c687e02d066677024ba24ce773ef6ca7c05c378419b23a1ff791082d1281a1db4d2ed8f39af9d

    • SSDEEP

      6144:g7gKd35kHouyXnZhB+R8WHqBV+UdvrEFp7hKNm:g7gKd3JuyXnPB+R8WHqBjvrEH7Wm

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks