General

  • Target

    ab2da41953699cfe13b0ae07306aec4849a8bbf7dfca0907efc85575e6a165ba

  • Size

    296KB

  • Sample

    250106-jmqx8s1jes

  • MD5

    0b606028d78d20cb0166d41199d46462

  • SHA1

    f81ef2ce4e3b533b93dee159949721f0276bae49

  • SHA256

    ab2da41953699cfe13b0ae07306aec4849a8bbf7dfca0907efc85575e6a165ba

  • SHA512

    51c2cc54e0eccda2b8d4fdb1a28f188fd6bd77b0dc4c83137826b324d41e1b51132a503d120bddd078f168d7b484fb15bde1b3b965cfa3c40a9a8530282b7dfd

  • SSDEEP

    6144:h+bfb9iRvtlQdR5cMCVFZSQVKWdF91xeuyJPAOvvsCxBV+UdvrEFp7hKy:houvtlQdkTPlFwuyJPhsCxBjvrEH7J

Malware Config

Targets

    • Target

      ab2da41953699cfe13b0ae07306aec4849a8bbf7dfca0907efc85575e6a165ba

    • Size

      296KB

    • MD5

      0b606028d78d20cb0166d41199d46462

    • SHA1

      f81ef2ce4e3b533b93dee159949721f0276bae49

    • SHA256

      ab2da41953699cfe13b0ae07306aec4849a8bbf7dfca0907efc85575e6a165ba

    • SHA512

      51c2cc54e0eccda2b8d4fdb1a28f188fd6bd77b0dc4c83137826b324d41e1b51132a503d120bddd078f168d7b484fb15bde1b3b965cfa3c40a9a8530282b7dfd

    • SSDEEP

      6144:h+bfb9iRvtlQdR5cMCVFZSQVKWdF91xeuyJPAOvvsCxBV+UdvrEFp7hKy:houvtlQdkTPlFwuyJPhsCxBjvrEH7J

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks