General

  • Target

    e7f6f8481212f4d893c5098b8a65afb08b368ab65fb172f937a8abcd82a130d6

  • Size

    809KB

  • Sample

    250125-jxqefsvpan

  • MD5

    d2be2fc95acb4e9a0b56c56b3046b87f

  • SHA1

    0181dea97bd703b3e39451c9d6b6626430856ef9

  • SHA256

    e7f6f8481212f4d893c5098b8a65afb08b368ab65fb172f937a8abcd82a130d6

  • SHA512

    7f38fe43e530fdb2b99aab12ca66b7f87d0708fdf9fb31706b86efa1beae729e2f6c8c349c19bd9a50c810269ccae351049e3fae7b3d8863c0f6bd7cb4d7c64e

  • SSDEEP

    12288:krZWmu51mWBlaALRxR57xSbAF4Ccrtp7dW7+5tnLE3mqKsKuuZ9BjvrEH79:kwmWBlV3Rhkb8crjdh7/q/RuhrEH79

Malware Config

Targets

    • Target

      e7f6f8481212f4d893c5098b8a65afb08b368ab65fb172f937a8abcd82a130d6

    • Size

      809KB

    • MD5

      d2be2fc95acb4e9a0b56c56b3046b87f

    • SHA1

      0181dea97bd703b3e39451c9d6b6626430856ef9

    • SHA256

      e7f6f8481212f4d893c5098b8a65afb08b368ab65fb172f937a8abcd82a130d6

    • SHA512

      7f38fe43e530fdb2b99aab12ca66b7f87d0708fdf9fb31706b86efa1beae729e2f6c8c349c19bd9a50c810269ccae351049e3fae7b3d8863c0f6bd7cb4d7c64e

    • SSDEEP

      12288:krZWmu51mWBlaALRxR57xSbAF4Ccrtp7dW7+5tnLE3mqKsKuuZ9BjvrEH79:kwmWBlV3Rhkb8crjdh7/q/RuhrEH79

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Blocklisted process makes network request

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks