General

  • Target

    aa244f97fe4ee7ab887e62fcce98aec5304b4d2ffe9df40ad02f35a4e7a71421N.exe

  • Size

    317KB

  • Sample

    250110-3p2bjawlbq

  • MD5

    1182b161d3d4f03e9378992b59c95230

  • SHA1

    b53c4d8e064c8dbd8fd68dcccbff1e844edd4b1e

  • SHA256

    aa244f97fe4ee7ab887e62fcce98aec5304b4d2ffe9df40ad02f35a4e7a71421

  • SHA512

    c814a29b3e41cdb306847509daf40687c834a46dcd7f7633de9fa9f32c60550551baf1cf1eccb4ea2602ab7806e3892621c308aca98f864c942e3ac195edbe40

  • SSDEEP

    6144:eXfQOrRezFWuRwIUnJs32YzoAuvZ2qU1fTKEGykpwz/BV+UdvrEFp7hK6Rr:eXoOrReFWQkEzobg1fT8mrBjvrEH7xRr

Malware Config

Targets

    • Target

      aa244f97fe4ee7ab887e62fcce98aec5304b4d2ffe9df40ad02f35a4e7a71421N.exe

    • Size

      317KB

    • MD5

      1182b161d3d4f03e9378992b59c95230

    • SHA1

      b53c4d8e064c8dbd8fd68dcccbff1e844edd4b1e

    • SHA256

      aa244f97fe4ee7ab887e62fcce98aec5304b4d2ffe9df40ad02f35a4e7a71421

    • SHA512

      c814a29b3e41cdb306847509daf40687c834a46dcd7f7633de9fa9f32c60550551baf1cf1eccb4ea2602ab7806e3892621c308aca98f864c942e3ac195edbe40

    • SSDEEP

      6144:eXfQOrRezFWuRwIUnJs32YzoAuvZ2qU1fTKEGykpwz/BV+UdvrEFp7hK6Rr:eXoOrReFWQkEzobg1fT8mrBjvrEH7xRr

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks