General

  • Target

    9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262N.exe

  • Size

    465KB

  • Sample

    250122-yxtt7stran

  • MD5

    96f1a1263c9b621cc8b4157805724de0

  • SHA1

    e0f34401554d74b453784356ba6386155223d986

  • SHA256

    9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262

  • SHA512

    42ab902124017753722fff19295f2a936c34180386b6103b42d98297dbf95afded865639a701cc82745f532f77818b7b32c4c175a3f6f94459911919c87529cb

  • SSDEEP

    12288:5uJusUSao217d8jG3+kUjKiLFpxxNWBjvrEH7U0:5uc4ao21udklSFpbarEH7U0

Malware Config

Targets

    • Target

      9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262N.exe

    • Size

      465KB

    • MD5

      96f1a1263c9b621cc8b4157805724de0

    • SHA1

      e0f34401554d74b453784356ba6386155223d986

    • SHA256

      9bff37817dcd7674819b0930bc2ae69ddec9cf1214ffb1888670f6a96c257262

    • SHA512

      42ab902124017753722fff19295f2a936c34180386b6103b42d98297dbf95afded865639a701cc82745f532f77818b7b32c4c175a3f6f94459911919c87529cb

    • SSDEEP

      12288:5uJusUSao217d8jG3+kUjKiLFpxxNWBjvrEH7U0:5uc4ao21udklSFpbarEH7U0

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks