General

  • Target

    de8ed334736a1778c4f4366d8cf003a61932b69d3e894087f788c9e3c98f5728

  • Size

    440KB

  • Sample

    250106-hj919s1qen

  • MD5

    4702af5c778835e240d7b572924f7376

  • SHA1

    d50c52c0df2de3ef2d4e81946b01da7bcd4a61fd

  • SHA256

    de8ed334736a1778c4f4366d8cf003a61932b69d3e894087f788c9e3c98f5728

  • SHA512

    b68065719d5748390b214609298a4a80412d2dd683b523ce9940abc4e7c31f46357e373d9015b4907b5f2c95cf51803db6f865a39e5e1cb18c65011af8f386cf

  • SSDEEP

    12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjm8NO0qw26WfF02/S0lqJqT:+el3+X0DIfeUYqcZQCGm4YprEH7F3

Malware Config

Targets

    • Target

      de8ed334736a1778c4f4366d8cf003a61932b69d3e894087f788c9e3c98f5728

    • Size

      440KB

    • MD5

      4702af5c778835e240d7b572924f7376

    • SHA1

      d50c52c0df2de3ef2d4e81946b01da7bcd4a61fd

    • SHA256

      de8ed334736a1778c4f4366d8cf003a61932b69d3e894087f788c9e3c98f5728

    • SHA512

      b68065719d5748390b214609298a4a80412d2dd683b523ce9940abc4e7c31f46357e373d9015b4907b5f2c95cf51803db6f865a39e5e1cb18c65011af8f386cf

    • SSDEEP

      12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjm8NO0qw26WfF02/S0lqJqT:+el3+X0DIfeUYqcZQCGm4YprEH7F3

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks