General

  • Target

    30d441845907893bc9afe6efe2d2c5d40a72077ea88323cfe7d9cfb14ee9ed50

  • Size

    943KB

  • Sample

    250111-f4jcyawmdx

  • MD5

    0f04c27b787e6612bd42b30037403116

  • SHA1

    94b8be9e847c9db8d5165758d4e650fb5325d637

  • SHA256

    30d441845907893bc9afe6efe2d2c5d40a72077ea88323cfe7d9cfb14ee9ed50

  • SHA512

    b1a2daf7e260289fd7a1309b24f2542fb37385f1224321ba7b89a3be7fb1b1894cf6e0396deed74d0aa98f3c4a11c31c1422b93cef8e331b20c0bf4d34653e50

  • SSDEEP

    24576:vOo5yT/tMbHWc8eC9TqOU012+lm/HIpUqpe1kVlFo1U1rmrEH7vvfd:vOowTKbHqlwBInpikDGArlfd

Malware Config

Targets

    • Target

      30d441845907893bc9afe6efe2d2c5d40a72077ea88323cfe7d9cfb14ee9ed50

    • Size

      943KB

    • MD5

      0f04c27b787e6612bd42b30037403116

    • SHA1

      94b8be9e847c9db8d5165758d4e650fb5325d637

    • SHA256

      30d441845907893bc9afe6efe2d2c5d40a72077ea88323cfe7d9cfb14ee9ed50

    • SHA512

      b1a2daf7e260289fd7a1309b24f2542fb37385f1224321ba7b89a3be7fb1b1894cf6e0396deed74d0aa98f3c4a11c31c1422b93cef8e331b20c0bf4d34653e50

    • SSDEEP

      24576:vOo5yT/tMbHWc8eC9TqOU012+lm/HIpUqpe1kVlFo1U1rmrEH7vvfd:vOowTKbHqlwBInpikDGArlfd

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks