General

  • Target

    8cded506c1608a3f56fa0d4c8c269db5341a9b482ab9468eac9372ba8ae4f569N.exe

  • Size

    1.7MB

  • Sample

    250110-yfptxstrcw

  • MD5

    757f6c5dd4e5f6aa5eefe638f3812b60

  • SHA1

    b067881bfc1a346bc23d6a9cbf825145adfeea32

  • SHA256

    8cded506c1608a3f56fa0d4c8c269db5341a9b482ab9468eac9372ba8ae4f569

  • SHA512

    498a7dce2fa35a0d3cb0028a16ec6b8d6d437596fc774c98a7f48f66d6fbfd1c43a371b68c84e96d84427e3c721bc9df63cd1532f0770bbcac70d344f6377cc0

  • SSDEEP

    24576:UHPcgkDwhpEPQzH/tX4hzRBiXJk3wbFJjTib7DllUD47SDXj/KOec5AmfQQRAH1F:UrylBcbybfOTvZAIVRkokHT9krrkQ1qT

Malware Config

Targets

    • Target

      8cded506c1608a3f56fa0d4c8c269db5341a9b482ab9468eac9372ba8ae4f569N.exe

    • Size

      1.7MB

    • MD5

      757f6c5dd4e5f6aa5eefe638f3812b60

    • SHA1

      b067881bfc1a346bc23d6a9cbf825145adfeea32

    • SHA256

      8cded506c1608a3f56fa0d4c8c269db5341a9b482ab9468eac9372ba8ae4f569

    • SHA512

      498a7dce2fa35a0d3cb0028a16ec6b8d6d437596fc774c98a7f48f66d6fbfd1c43a371b68c84e96d84427e3c721bc9df63cd1532f0770bbcac70d344f6377cc0

    • SSDEEP

      24576:UHPcgkDwhpEPQzH/tX4hzRBiXJk3wbFJjTib7DllUD47SDXj/KOec5AmfQQRAH1F:UrylBcbybfOTvZAIVRkokHT9krrkQ1qT

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Network Service Discovery

      Attempt to gather information on host's network.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks