General

  • Target

    b21575f86639bff8a30080b9706ea33661f0bf415bbde3afa3f8b27bde23d532N.exe

  • Size

    2.9MB

  • Sample

    250108-g1f9vaxnfz

  • MD5

    adb0e4c5dc14a6930685b82edd2b7b70

  • SHA1

    2e1a523fbddd9b2f402a9497f450ac057f09a8bc

  • SHA256

    b21575f86639bff8a30080b9706ea33661f0bf415bbde3afa3f8b27bde23d532

  • SHA512

    3c134c8c8a445a4d6b4ea5c033d027364f2f7eea00da1efb9daa304da7a9e0713bf8c45b392c489f1a1d2bee6345e571eb900016cd7d9695751f202ec79200f0

  • SSDEEP

    49152:HtQEKKEA2biE2JCa01conHjIfDjo6VuqTBgknBDoaiEqvn893NbbLM+WA+qvP:HtxEA2b2JTsjMDU6VuJkdoaTqk91aqH

Malware Config

Targets

    • Target

      b21575f86639bff8a30080b9706ea33661f0bf415bbde3afa3f8b27bde23d532N.exe

    • Size

      2.9MB

    • MD5

      adb0e4c5dc14a6930685b82edd2b7b70

    • SHA1

      2e1a523fbddd9b2f402a9497f450ac057f09a8bc

    • SHA256

      b21575f86639bff8a30080b9706ea33661f0bf415bbde3afa3f8b27bde23d532

    • SHA512

      3c134c8c8a445a4d6b4ea5c033d027364f2f7eea00da1efb9daa304da7a9e0713bf8c45b392c489f1a1d2bee6345e571eb900016cd7d9695751f202ec79200f0

    • SSDEEP

      49152:HtQEKKEA2biE2JCa01conHjIfDjo6VuqTBgknBDoaiEqvn893NbbLM+WA+qvP:HtxEA2b2JTsjMDU6VuJkdoaTqk91aqH

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks