General

  • Target

    6f9873391f7eb974899a711dc0952460199597a892568ef246b3656017d4d581

  • Size

    286KB

  • Sample

    250111-ldv7psvkcv

  • MD5

    9b8c20e2c6a384abfdae485a982af113

  • SHA1

    75ac2602531a961b2d9a26bd54ee383563c3bcd0

  • SHA256

    6f9873391f7eb974899a711dc0952460199597a892568ef246b3656017d4d581

  • SHA512

    5b6f6603da2920e885e628efc6338cb0a7f4f5eba588ebd0342353eccfb83983d74ad5431c58e6c559775c53d07270f39c1db5a9c219af3858c2dfbf362025c8

  • SSDEEP

    6144:A7gKNk2R5kHouyXnZhB+h8WHlBV+UdvrEFp7hKP3:A7gKNk2RJuyXnPB+h8WHlBjvrEH7i3

Malware Config

Targets

    • Target

      6f9873391f7eb974899a711dc0952460199597a892568ef246b3656017d4d581

    • Size

      286KB

    • MD5

      9b8c20e2c6a384abfdae485a982af113

    • SHA1

      75ac2602531a961b2d9a26bd54ee383563c3bcd0

    • SHA256

      6f9873391f7eb974899a711dc0952460199597a892568ef246b3656017d4d581

    • SHA512

      5b6f6603da2920e885e628efc6338cb0a7f4f5eba588ebd0342353eccfb83983d74ad5431c58e6c559775c53d07270f39c1db5a9c219af3858c2dfbf362025c8

    • SSDEEP

      6144:A7gKNk2R5kHouyXnZhB+h8WHlBV+UdvrEFp7hKP3:A7gKNk2RJuyXnPB+h8WHlBjvrEH7i3

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks