General

  • Target

    537d87471e3d04ee6cb735bd4d2ea5713cc277c7d5da3a2f3ba174a4cae37c01

  • Size

    286KB

  • Sample

    250130-jr1m8sxken

  • MD5

    2feb81fe9952299ddb88a2af2777a145

  • SHA1

    b0660ce800b393de14beb2a3a238539cd8929776

  • SHA256

    537d87471e3d04ee6cb735bd4d2ea5713cc277c7d5da3a2f3ba174a4cae37c01

  • SHA512

    fdc01630236cf345ce43c32ade1b0f8e3113ff5a42f9f173ca29665df19570508e1a8b314d698b0a8473987b66e4dd8f8670762ef9685b8427da293866bf693f

  • SSDEEP

    6144:jcgKNkhSR/5kHouyXnZhB+h8WHlBV+UdvrEFp7hK+WTUT:jcgKNkhm/JuyXnPB+h8WHlBjvrEH7SUT

Malware Config

Targets

    • Target

      537d87471e3d04ee6cb735bd4d2ea5713cc277c7d5da3a2f3ba174a4cae37c01

    • Size

      286KB

    • MD5

      2feb81fe9952299ddb88a2af2777a145

    • SHA1

      b0660ce800b393de14beb2a3a238539cd8929776

    • SHA256

      537d87471e3d04ee6cb735bd4d2ea5713cc277c7d5da3a2f3ba174a4cae37c01

    • SHA512

      fdc01630236cf345ce43c32ade1b0f8e3113ff5a42f9f173ca29665df19570508e1a8b314d698b0a8473987b66e4dd8f8670762ef9685b8427da293866bf693f

    • SSDEEP

      6144:jcgKNkhSR/5kHouyXnZhB+h8WHlBV+UdvrEFp7hK+WTUT:jcgKNkhm/JuyXnPB+h8WHlBjvrEH7SUT

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks