General

  • Target

    c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813N.exe

  • Size

    465KB

  • Sample

    250127-cxdbkaxkcj

  • MD5

    f8f8d20ae5c995f33152c842bdb8df00

  • SHA1

    72343889935efe5c1c14793bbbcd17484a8f71d0

  • SHA256

    c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813

  • SHA512

    698991065dbc03125c34e8c6ffb25d20bdd86b5f00017f89d0c719142382d1f3da2028d17e498994c5bcdb0e0a1853dde8a6802a507990c089d7f44ea31b2ae2

  • SSDEEP

    12288:5uJusUSao21YTG3+kLKiLFpjxNWBjvrEH7eMy:5uc4ao21AdkeSFpdarEH7Xy

Malware Config

Targets

    • Target

      c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813N.exe

    • Size

      465KB

    • MD5

      f8f8d20ae5c995f33152c842bdb8df00

    • SHA1

      72343889935efe5c1c14793bbbcd17484a8f71d0

    • SHA256

      c510e43b9bfa87513edecf7ac9aa1ece220c22949e0c21c0c3adfec97592f813

    • SHA512

      698991065dbc03125c34e8c6ffb25d20bdd86b5f00017f89d0c719142382d1f3da2028d17e498994c5bcdb0e0a1853dde8a6802a507990c089d7f44ea31b2ae2

    • SSDEEP

      12288:5uJusUSao21YTG3+kLKiLFpjxNWBjvrEH7eMy:5uc4ao21AdkeSFpdarEH7Xy

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks