General

  • Target

    f0530c90091cce4f2bad99763401497c350726be48318d1b8c3e846caf2e7c08N.exe

  • Size

    1.5MB

  • Sample

    250111-kdvqhasqay

  • MD5

    5c7befde17edd5017ad140796aeb7020

  • SHA1

    10302dd1d3637d47e52a6788f2a5bc118dd78a1c

  • SHA256

    f0530c90091cce4f2bad99763401497c350726be48318d1b8c3e846caf2e7c08

  • SHA512

    3d1235a1671e84bdefdc11bf1d3d6f7a91bd59fa365c3a20882e0d9bed504722e5df40bf0d764b8f976898bf0accbedad4cda5e7eeda59a5c8e4d3944a09f15b

  • SSDEEP

    24576:Ya6ZdpKZ7l/i9oDBcG1TFhcmTIHgqM6j86iT/+o20GljGYufOsJrEH7t:f6rpKZGoDBcG1TM8+oYljGXf52

Malware Config

Targets

    • Target

      f0530c90091cce4f2bad99763401497c350726be48318d1b8c3e846caf2e7c08N.exe

    • Size

      1.5MB

    • MD5

      5c7befde17edd5017ad140796aeb7020

    • SHA1

      10302dd1d3637d47e52a6788f2a5bc118dd78a1c

    • SHA256

      f0530c90091cce4f2bad99763401497c350726be48318d1b8c3e846caf2e7c08

    • SHA512

      3d1235a1671e84bdefdc11bf1d3d6f7a91bd59fa365c3a20882e0d9bed504722e5df40bf0d764b8f976898bf0accbedad4cda5e7eeda59a5c8e4d3944a09f15b

    • SSDEEP

      24576:Ya6ZdpKZ7l/i9oDBcG1TFhcmTIHgqM6j86iT/+o20GljGYufOsJrEH7t:f6rpKZGoDBcG1TM8+oYljGXf52

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks