General

  • Target

    f4488138b3c084ad39db1d3431c01e53b77917ce68b351c5da1c0f2d58ebf248

  • Size

    1.4MB

  • Sample

    250109-g6jbdstpbq

  • MD5

    ad17ec9af15b1e15ae153ba392bf2a44

  • SHA1

    5601b3b805ffdb141e84f6df10bb2b0d417655b2

  • SHA256

    f4488138b3c084ad39db1d3431c01e53b77917ce68b351c5da1c0f2d58ebf248

  • SHA512

    d11883f78ded06d5e538194fe701ff344b96b68d94f9c6fcb1a72638cb9dd72f688938d90e443d286af85ee4d3b9b37aab77ee431b953cc77b07901542cf9b46

  • SSDEEP

    24576:gmK/B1FBgDXZNFfZoWe0KVIC9ClKa5IrykTHhQ5NoRyftZZriXWzr6pfKuI/rEHJ:Q1rgXteP3Vz9oI2mhoNosVDP+fXp

Malware Config

Targets

    • Target

      f4488138b3c084ad39db1d3431c01e53b77917ce68b351c5da1c0f2d58ebf248

    • Size

      1.4MB

    • MD5

      ad17ec9af15b1e15ae153ba392bf2a44

    • SHA1

      5601b3b805ffdb141e84f6df10bb2b0d417655b2

    • SHA256

      f4488138b3c084ad39db1d3431c01e53b77917ce68b351c5da1c0f2d58ebf248

    • SHA512

      d11883f78ded06d5e538194fe701ff344b96b68d94f9c6fcb1a72638cb9dd72f688938d90e443d286af85ee4d3b9b37aab77ee431b953cc77b07901542cf9b46

    • SSDEEP

      24576:gmK/B1FBgDXZNFfZoWe0KVIC9ClKa5IrykTHhQ5NoRyftZZriXWzr6pfKuI/rEHJ:Q1rgXteP3Vz9oI2mhoNosVDP+fXp

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Event Triggered Execution: Image File Execution Options Injection

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks