General

  • Target

    58bfded98eb89659a13a8af383aa3a2d1759879349b931c77689432f2fb8ce8d

  • Size

    200KB

  • Sample

    250110-lyfbzstlbl

  • MD5

    94774d7302bdd7aa85cc32f364a9cbee

  • SHA1

    294cfa9b53d171522a7ade6786fa71a6b60d31bb

  • SHA256

    58bfded98eb89659a13a8af383aa3a2d1759879349b931c77689432f2fb8ce8d

  • SHA512

    08147550054c74b8b600bab34ea199a7f85af5c12e7af8d3f27432bae52e57b67f44aa157950ef92c2c7e061f4bb8a0b1d1b948f8e2eb0624beb291f3d4974c7

  • SSDEEP

    3072:YxGHHDhnWZ2wwxsE8Ps9s55gaGe3k5GgP2lQBV+UdE+rECWp7hKQ:YxGHjhwSlO5+aGcgTBV+UdvrEFp7hKQ

Malware Config

Targets

    • Target

      58bfded98eb89659a13a8af383aa3a2d1759879349b931c77689432f2fb8ce8d

    • Size

      200KB

    • MD5

      94774d7302bdd7aa85cc32f364a9cbee

    • SHA1

      294cfa9b53d171522a7ade6786fa71a6b60d31bb

    • SHA256

      58bfded98eb89659a13a8af383aa3a2d1759879349b931c77689432f2fb8ce8d

    • SHA512

      08147550054c74b8b600bab34ea199a7f85af5c12e7af8d3f27432bae52e57b67f44aa157950ef92c2c7e061f4bb8a0b1d1b948f8e2eb0624beb291f3d4974c7

    • SSDEEP

      3072:YxGHHDhnWZ2wwxsE8Ps9s55gaGe3k5GgP2lQBV+UdE+rECWp7hKQ:YxGHjhwSlO5+aGcgTBV+UdvrEFp7hKQ

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks