General

  • Target

    541d6978647d2ba6a8537b97102f2ad7e42982d7f6db5535f11ce5fe760474ae

  • Size

    943KB

  • Sample

    250125-hj3xysslhl

  • MD5

    3b741c94b87ef31baa577d4e034ae440

  • SHA1

    d40fe168922cc7c314410ab195ee849461d055c1

  • SHA256

    541d6978647d2ba6a8537b97102f2ad7e42982d7f6db5535f11ce5fe760474ae

  • SHA512

    0a17c62e5ca83ecabeab169f34af3a9f7fc720143dc3f73cb7e7c7cec0abf9ad79948630dc484eaa10380f21394788b4629c73068a6f38ccce3b3d1723d0fc4e

  • SSDEEP

    24576:wOo5yT/tMbHW4eC9TqOUk12+lm/HIpUqps1kVlFo1U4NwrEH79d:wOowTKbHrlcBInp0kDGdN7

Malware Config

Targets

    • Target

      541d6978647d2ba6a8537b97102f2ad7e42982d7f6db5535f11ce5fe760474ae

    • Size

      943KB

    • MD5

      3b741c94b87ef31baa577d4e034ae440

    • SHA1

      d40fe168922cc7c314410ab195ee849461d055c1

    • SHA256

      541d6978647d2ba6a8537b97102f2ad7e42982d7f6db5535f11ce5fe760474ae

    • SHA512

      0a17c62e5ca83ecabeab169f34af3a9f7fc720143dc3f73cb7e7c7cec0abf9ad79948630dc484eaa10380f21394788b4629c73068a6f38ccce3b3d1723d0fc4e

    • SSDEEP

      24576:wOo5yT/tMbHW4eC9TqOUk12+lm/HIpUqps1kVlFo1U4NwrEH79d:wOowTKbHrlcBInp0kDGdN7

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks