General

  • Target

    c84d7dadeddd5ef0a7cbebd6a6d0d7bc736488ab0faf7898f3d2ac19bdc57f64

  • Size

    1.1MB

  • Sample

    250110-jqlspaxnaw

  • MD5

    773c63579908a4a2cb4af9295b7e9c6c

  • SHA1

    fb36717c521b7fb3a1f02368c160caf8f8e98654

  • SHA256

    c84d7dadeddd5ef0a7cbebd6a6d0d7bc736488ab0faf7898f3d2ac19bdc57f64

  • SHA512

    cd192f6262622ab7efc8557de7912e5ac1070e1c85a8f00cbd591e67f43dbcabf45af8c20cfc8c0cb7f34e3b0f09fc6c8f3c89e718ebbd598f9d126941ca7acc

  • SSDEEP

    24576:X1hMlO8tF6FQaYZm0NKhByHUryZP1uUjAmRTTT+uN4Vqqh6ZrEH7G:jYs+fovy2gvjvTOW4Vqqh6p

Malware Config

Targets

    • Target

      c84d7dadeddd5ef0a7cbebd6a6d0d7bc736488ab0faf7898f3d2ac19bdc57f64

    • Size

      1.1MB

    • MD5

      773c63579908a4a2cb4af9295b7e9c6c

    • SHA1

      fb36717c521b7fb3a1f02368c160caf8f8e98654

    • SHA256

      c84d7dadeddd5ef0a7cbebd6a6d0d7bc736488ab0faf7898f3d2ac19bdc57f64

    • SHA512

      cd192f6262622ab7efc8557de7912e5ac1070e1c85a8f00cbd591e67f43dbcabf45af8c20cfc8c0cb7f34e3b0f09fc6c8f3c89e718ebbd598f9d126941ca7acc

    • SSDEEP

      24576:X1hMlO8tF6FQaYZm0NKhByHUryZP1uUjAmRTTT+uN4Vqqh6ZrEH7G:jYs+fovy2gvjvTOW4Vqqh6p

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks