General

  • Target

    23be9cf325da0324f4144d2386b1bf9f6e28b40cae62b06c17b21f5850fa5fa0

  • Size

    440KB

  • Sample

    250111-f7mvjawpds

  • MD5

    652274922086e68e31944ed3a691bbfd

  • SHA1

    ebf731780566e778f38990b28ae407d3e1990692

  • SHA256

    23be9cf325da0324f4144d2386b1bf9f6e28b40cae62b06c17b21f5850fa5fa0

  • SHA512

    e38d958ac6aeb50904957c90260ef26b4dd71900afa2741b4004d399b67b1a6a0267aa34d3cf98bb1b4b8fdf9186bba4be9347aff3edbb36e0db3976b346855f

  • SSDEEP

    12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjH8NO0qwxeeJ2/S0lqJqcZP:+el3+60D/UYqcZQCGm4YprEH7a

Malware Config

Targets

    • Target

      23be9cf325da0324f4144d2386b1bf9f6e28b40cae62b06c17b21f5850fa5fa0

    • Size

      440KB

    • MD5

      652274922086e68e31944ed3a691bbfd

    • SHA1

      ebf731780566e778f38990b28ae407d3e1990692

    • SHA256

      23be9cf325da0324f4144d2386b1bf9f6e28b40cae62b06c17b21f5850fa5fa0

    • SHA512

      e38d958ac6aeb50904957c90260ef26b4dd71900afa2741b4004d399b67b1a6a0267aa34d3cf98bb1b4b8fdf9186bba4be9347aff3edbb36e0db3976b346855f

    • SSDEEP

      12288:2/J+CtaxnjZpAbxdxDcWcnR4bfXfwiSeiw8xHgbYpjH8NO0qwxeeJ2/S0lqJqcZP:+el3+60D/UYqcZQCGm4YprEH7a

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks