General

  • Target

    f00e6bb0f46ab813b878dfd031ea87a217a8737a8743f46a3e505e46cfa458e5

  • Size

    931KB

  • Sample

    250121-ggbv1syqdn

  • MD5

    28b5174aae21651ebfe075183b09376b

  • SHA1

    af5a7f8c19429c438f55e74a0f98acbba7635446

  • SHA256

    f00e6bb0f46ab813b878dfd031ea87a217a8737a8743f46a3e505e46cfa458e5

  • SHA512

    0a8bd3c2f1e619e3f7399a25ac33dbb3e51f61d1e9eddf90c43e3a35a61134e269720c1b360427866b8ad081f1f8d8f8f7c7074b7f13aa78d19349a80fbd81ce

  • SSDEEP

    24576:6HZFeyDGbpHsjUa9bP9fOihv61Y7c1IouZgGnFAZrEH7M:6HdDaKD66ceouqYm

Malware Config

Targets

    • Target

      f00e6bb0f46ab813b878dfd031ea87a217a8737a8743f46a3e505e46cfa458e5

    • Size

      931KB

    • MD5

      28b5174aae21651ebfe075183b09376b

    • SHA1

      af5a7f8c19429c438f55e74a0f98acbba7635446

    • SHA256

      f00e6bb0f46ab813b878dfd031ea87a217a8737a8743f46a3e505e46cfa458e5

    • SHA512

      0a8bd3c2f1e619e3f7399a25ac33dbb3e51f61d1e9eddf90c43e3a35a61134e269720c1b360427866b8ad081f1f8d8f8f7c7074b7f13aa78d19349a80fbd81ce

    • SSDEEP

      24576:6HZFeyDGbpHsjUa9bP9fOihv61Y7c1IouZgGnFAZrEH7M:6HdDaKD66ceouqYm

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks