General

  • Target

    8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9aN.exe

  • Size

    114KB

  • Sample

    250119-yvvcystqhr

  • MD5

    cc26122da6d0bf10d9da2255237c6da0

  • SHA1

    07e38362aa8a166d89f7cf2566b9680165041848

  • SHA256

    8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9a

  • SHA512

    dd6e42fbe355ff8d4302920ab56b0e870618302986f25cbc42acae90163ea5810e284447611f17c95a2163275a9efb70f697690fa8cc9cbaae213abf5676e4a3

  • SSDEEP

    1536:UpO1EksQRjv9qxgfOt2B8YQaXTRtLK+3STKx+3Py0KZGqNC03f3sdAymXFzgt1fu:UksQRfPpQuF4BOoTjcIDiFC1fIf

Malware Config

Targets

    • Target

      8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9aN.exe

    • Size

      114KB

    • MD5

      cc26122da6d0bf10d9da2255237c6da0

    • SHA1

      07e38362aa8a166d89f7cf2566b9680165041848

    • SHA256

      8d2c54feced81edaaef3a0788cb4dfc76278ebd3b54328e8c09d0eb3f7cf8d9a

    • SHA512

      dd6e42fbe355ff8d4302920ab56b0e870618302986f25cbc42acae90163ea5810e284447611f17c95a2163275a9efb70f697690fa8cc9cbaae213abf5676e4a3

    • SSDEEP

      1536:UpO1EksQRjv9qxgfOt2B8YQaXTRtLK+3STKx+3Py0KZGqNC03f3sdAymXFzgt1fu:UksQRfPpQuF4BOoTjcIDiFC1fIf

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Modifies WinLogon for persistence

    • Modifies visibility of file extensions in Explorer

    • Modifies visiblity of hidden/system files in Explorer

    • Detects Floxif payload

    • Disables RegEdit via registry modification

    • Event Triggered Execution: Image File Execution Options Injection

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks