General

  • Target

    6dc961de872c8a293cdb382223638eb791147889133973b301c43bee172baacf

  • Size

    682KB

  • Sample

    250110-cmsnhaykf1

  • MD5

    10545e157df8e69155519cb1355d9a3c

  • SHA1

    d413ae6e6f1b3d7576fb094fb954f1acc7ddd9c5

  • SHA256

    6dc961de872c8a293cdb382223638eb791147889133973b301c43bee172baacf

  • SHA512

    265af24231ee23f955ba65d8bb745566c6501e4455da4e2bceabc02da34952155099974c91f6dfa4ce7db52093473fe88148613acd501240b4eeff387acd034d

  • SSDEEP

    12288:i27LkbxmJKdxEMAvMfKfDRhbR5P3vT7UOX+fsb/IhC+QqoHBjvrEH7kI4y:i27Km4wMDCNZ3vUsiCfqyrEH7b4y

Malware Config

Targets

    • Target

      6dc961de872c8a293cdb382223638eb791147889133973b301c43bee172baacf

    • Size

      682KB

    • MD5

      10545e157df8e69155519cb1355d9a3c

    • SHA1

      d413ae6e6f1b3d7576fb094fb954f1acc7ddd9c5

    • SHA256

      6dc961de872c8a293cdb382223638eb791147889133973b301c43bee172baacf

    • SHA512

      265af24231ee23f955ba65d8bb745566c6501e4455da4e2bceabc02da34952155099974c91f6dfa4ce7db52093473fe88148613acd501240b4eeff387acd034d

    • SSDEEP

      12288:i27LkbxmJKdxEMAvMfKfDRhbR5P3vT7UOX+fsb/IhC+QqoHBjvrEH7kI4y:i27Km4wMDCNZ3vUsiCfqyrEH7b4y

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks