General

  • Target

    ca8282ee04a8fbc86ddbbebb7fd07c583b790f2c7208429ebf8b36ae2fbcfab3

  • Size

    116KB

  • Sample

    250108-j2n27atnbq

  • MD5

    ee30eda278d147a17f0b5d10f3d4279c

  • SHA1

    b55ee644dd65d3b54437bdadbef4ea0f6f89dac6

  • SHA256

    ca8282ee04a8fbc86ddbbebb7fd07c583b790f2c7208429ebf8b36ae2fbcfab3

  • SHA512

    04bcb6aac2194add156921a6580e837415f5b8a1e232baa01399de88a1c398aec6b016d0e9ae88e35918e9c03c90694d31de4213368da12190892b263f458242

  • SSDEEP

    1536:kk2i9mVscPgvgGX8NEzTN2s+zheW6BVrqzCJ3bdDY+W14N4NmzWlIA7hKRQYV6:kvhPgvJX8NEN2lQBV+UdE+rECWp7hKB8

Malware Config

Targets

    • Target

      ca8282ee04a8fbc86ddbbebb7fd07c583b790f2c7208429ebf8b36ae2fbcfab3

    • Size

      116KB

    • MD5

      ee30eda278d147a17f0b5d10f3d4279c

    • SHA1

      b55ee644dd65d3b54437bdadbef4ea0f6f89dac6

    • SHA256

      ca8282ee04a8fbc86ddbbebb7fd07c583b790f2c7208429ebf8b36ae2fbcfab3

    • SHA512

      04bcb6aac2194add156921a6580e837415f5b8a1e232baa01399de88a1c398aec6b016d0e9ae88e35918e9c03c90694d31de4213368da12190892b263f458242

    • SSDEEP

      1536:kk2i9mVscPgvgGX8NEzTN2s+zheW6BVrqzCJ3bdDY+W14N4NmzWlIA7hKRQYV6:kvhPgvJX8NEN2lQBV+UdE+rECWp7hKB8

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks