General

  • Target

    dad1fa650711cf8b7efbec72ff04c8a329ab7dd77c11d574e79f605ab757762eN.exe

  • Size

    1.6MB

  • Sample

    250122-wlyb5syqak

  • MD5

    0ecba4b6e163fbd63a9941fab70822a0

  • SHA1

    1a68bc63b46d2cb074e99085db942207beac5625

  • SHA256

    dad1fa650711cf8b7efbec72ff04c8a329ab7dd77c11d574e79f605ab757762e

  • SHA512

    1903eaa64d269c15cdfb231ff801db6ea27a08cb2530beb4de000c6287c51ae24aee7bd0b4e4db3d2f7c0d269ba45c679143ab97e0e52a002e1707c6f2908197

  • SSDEEP

    49152:3qKwtScFsKk3aQ4u1XWZ9Yudg8P6R/TSud6e6m2:6KwtS3Kk3aQFQTYIgMpud6o2

Malware Config

Targets

    • Target

      dad1fa650711cf8b7efbec72ff04c8a329ab7dd77c11d574e79f605ab757762eN.exe

    • Size

      1.6MB

    • MD5

      0ecba4b6e163fbd63a9941fab70822a0

    • SHA1

      1a68bc63b46d2cb074e99085db942207beac5625

    • SHA256

      dad1fa650711cf8b7efbec72ff04c8a329ab7dd77c11d574e79f605ab757762e

    • SHA512

      1903eaa64d269c15cdfb231ff801db6ea27a08cb2530beb4de000c6287c51ae24aee7bd0b4e4db3d2f7c0d269ba45c679143ab97e0e52a002e1707c6f2908197

    • SSDEEP

      49152:3qKwtScFsKk3aQ4u1XWZ9Yudg8P6R/TSud6e6m2:6KwtS3Kk3aQFQTYIgMpud6o2

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks