General

  • Target

    1694c666c777cee518697a761dd3b9483b3ce7085a9185676a1344908fa09ccd

  • Size

    561KB

  • Sample

    250107-gl7s9ayrap

  • MD5

    7324195572d3fddaebadfe3dab91477c

  • SHA1

    cef599e22aeab06e7fde2c6df25e382c5b387afb

  • SHA256

    1694c666c777cee518697a761dd3b9483b3ce7085a9185676a1344908fa09ccd

  • SHA512

    6cdd4d8c9ebe7a8af22fbf97ebd316487ea46809cee557191620ef985f7a1c81604fa8aa0fde2729cf0d6a7c63b7c8c31c4b1a6bb6f51f36add5898b07032b29

  • SSDEEP

    3072:pT6GYBFLiMSDdpfN/I1Q5zczsLgBerzj32lQBV+UdE+rECWp7hKQ:p2j0c94PBV+UdvrEFp7hKQ

Malware Config

Targets

    • Target

      1694c666c777cee518697a761dd3b9483b3ce7085a9185676a1344908fa09ccd

    • Size

      561KB

    • MD5

      7324195572d3fddaebadfe3dab91477c

    • SHA1

      cef599e22aeab06e7fde2c6df25e382c5b387afb

    • SHA256

      1694c666c777cee518697a761dd3b9483b3ce7085a9185676a1344908fa09ccd

    • SHA512

      6cdd4d8c9ebe7a8af22fbf97ebd316487ea46809cee557191620ef985f7a1c81604fa8aa0fde2729cf0d6a7c63b7c8c31c4b1a6bb6f51f36add5898b07032b29

    • SSDEEP

      3072:pT6GYBFLiMSDdpfN/I1Q5zczsLgBerzj32lQBV+UdE+rECWp7hKQ:p2j0c94PBV+UdvrEFp7hKQ

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks