General

  • Target

    276d727b7b306d8fb0fc91fad71f191ed7f4359d522a21864231ee65b5601135

  • Size

    464KB

  • Sample

    250128-1m17mssldy

  • MD5

    ec8bfcaf4cee9bfcbecfa723aa2900ca

  • SHA1

    def5a26d38f4b9d04d95a34e96f276746debcf0a

  • SHA256

    276d727b7b306d8fb0fc91fad71f191ed7f4359d522a21864231ee65b5601135

  • SHA512

    c04a7898cf023cb749a980ed056410ba89e89affa409f509d37465b2d44f692ab8316b37d4a4926589dda2d4d65dba0b34c740966532ae8a846ca2ecc4f84259

  • SSDEEP

    12288:5K3wT2b8X1JBxkSYnVWqqPIBONhxs7rleBjvrEH7ft:50wTmE5j/xs7RYrEH7ft

Malware Config

Targets

    • Target

      276d727b7b306d8fb0fc91fad71f191ed7f4359d522a21864231ee65b5601135

    • Size

      464KB

    • MD5

      ec8bfcaf4cee9bfcbecfa723aa2900ca

    • SHA1

      def5a26d38f4b9d04d95a34e96f276746debcf0a

    • SHA256

      276d727b7b306d8fb0fc91fad71f191ed7f4359d522a21864231ee65b5601135

    • SHA512

      c04a7898cf023cb749a980ed056410ba89e89affa409f509d37465b2d44f692ab8316b37d4a4926589dda2d4d65dba0b34c740966532ae8a846ca2ecc4f84259

    • SSDEEP

      12288:5K3wT2b8X1JBxkSYnVWqqPIBONhxs7rleBjvrEH7ft:50wTmE5j/xs7RYrEH7ft

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks