General

  • Target

    3a68a9e6cc968e679d5d9820c28173664cc4a266123c8683d0bb0ee413bb21a8

  • Size

    188KB

  • Sample

    250106-28fy9svjel

  • MD5

    50a1d482d4ada76e015bf6fb781ea67e

  • SHA1

    7e6d437d0146e840b5855c40d37ce103f8cd3010

  • SHA256

    3a68a9e6cc968e679d5d9820c28173664cc4a266123c8683d0bb0ee413bb21a8

  • SHA512

    d1ee36021b383b5a078a5723dcbda10665e9dde2afe536003c0480bd096cd6dba60b9788d3d5b08b0d12f118b1c278c47b2170ff22ba0f9f2a361dd3ffbb5b7c

  • SSDEEP

    3072:/8QMnst5cJaJyRr/+ksQcoWcxtegIxTtD2lQBV+UdE+rECWp7hKxx2:/8sHCp2ksQHtYHBV+UdvrEFp7hKxx2

Malware Config

Targets

    • Target

      3a68a9e6cc968e679d5d9820c28173664cc4a266123c8683d0bb0ee413bb21a8

    • Size

      188KB

    • MD5

      50a1d482d4ada76e015bf6fb781ea67e

    • SHA1

      7e6d437d0146e840b5855c40d37ce103f8cd3010

    • SHA256

      3a68a9e6cc968e679d5d9820c28173664cc4a266123c8683d0bb0ee413bb21a8

    • SHA512

      d1ee36021b383b5a078a5723dcbda10665e9dde2afe536003c0480bd096cd6dba60b9788d3d5b08b0d12f118b1c278c47b2170ff22ba0f9f2a361dd3ffbb5b7c

    • SSDEEP

      3072:/8QMnst5cJaJyRr/+ksQcoWcxtegIxTtD2lQBV+UdE+rECWp7hKxx2:/8sHCp2ksQHtYHBV+UdvrEFp7hKxx2

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks