General

  • Target

    46dbc7024bd3815f7ae461b80f2e8bda8641669345da1606e2527b63a238015d

  • Size

    943KB

  • Sample

    250125-hlyq1s1khv

  • MD5

    32cbda2ffd56d9874cfde58f2b876d0a

  • SHA1

    53700f6119e1d82fbd967fac048a6ab014290675

  • SHA256

    46dbc7024bd3815f7ae461b80f2e8bda8641669345da1606e2527b63a238015d

  • SHA512

    8630446930195946d730825bd81a79510d0e701251b0e071d1f955105abe6b808d74d44919cfda8935611efc7cb206604518a16280fae0982e10cdce1a45fda4

  • SSDEEP

    24576:KOo5yT/tMbHWcjeC9TqOUk12+lm/HIpUqp91kVlFo1UBUTrEH7VoD:KOowTKbHflcBInp3kDGEU/D

Malware Config

Targets

    • Target

      46dbc7024bd3815f7ae461b80f2e8bda8641669345da1606e2527b63a238015d

    • Size

      943KB

    • MD5

      32cbda2ffd56d9874cfde58f2b876d0a

    • SHA1

      53700f6119e1d82fbd967fac048a6ab014290675

    • SHA256

      46dbc7024bd3815f7ae461b80f2e8bda8641669345da1606e2527b63a238015d

    • SHA512

      8630446930195946d730825bd81a79510d0e701251b0e071d1f955105abe6b808d74d44919cfda8935611efc7cb206604518a16280fae0982e10cdce1a45fda4

    • SSDEEP

      24576:KOo5yT/tMbHWcjeC9TqOUk12+lm/HIpUqp91kVlFo1UBUTrEH7VoD:KOowTKbHflcBInp3kDGEU/D

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks