General

  • Target

    ccc04df196aa4c443a83bca8356f712ca5305414e2dc9a6ffabbdfd3af1a1467

  • Size

    620KB

  • Sample

    250109-ke1yxavkfw

  • MD5

    b5c86f732b7213c654d1ab965f08748a

  • SHA1

    c1349317b60c85fec596af2d9e805ed4dc1bd4df

  • SHA256

    ccc04df196aa4c443a83bca8356f712ca5305414e2dc9a6ffabbdfd3af1a1467

  • SHA512

    672b5443d9372160a6cb195197247534a39280e6a2d20a3e7317a64ff1754cd210866dd9c2067608b037425f915f1c3b5d9f9d1f7472a038c4ccfad9284f44e0

  • SSDEEP

    12288:regtabQWMONeeC/s7+H3IqNARN0QJgfzN7a95vqTBjvrEH7f:aKZOQy+TuXgfzlq5vsrEH7f

Malware Config

Targets

    • Target

      ccc04df196aa4c443a83bca8356f712ca5305414e2dc9a6ffabbdfd3af1a1467

    • Size

      620KB

    • MD5

      b5c86f732b7213c654d1ab965f08748a

    • SHA1

      c1349317b60c85fec596af2d9e805ed4dc1bd4df

    • SHA256

      ccc04df196aa4c443a83bca8356f712ca5305414e2dc9a6ffabbdfd3af1a1467

    • SHA512

      672b5443d9372160a6cb195197247534a39280e6a2d20a3e7317a64ff1754cd210866dd9c2067608b037425f915f1c3b5d9f9d1f7472a038c4ccfad9284f44e0

    • SSDEEP

      12288:regtabQWMONeeC/s7+H3IqNARN0QJgfzN7a95vqTBjvrEH7f:aKZOQy+TuXgfzlq5vsrEH7f

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks