General

  • Target

    bf275eee55190a4315463ca24159e5d44b7a43cd02c70a562647f4834416145c

  • Size

    1.5MB

  • Sample

    250205-edg7hsxrfz

  • MD5

    236909d2379c67cff1ec03f0bb4c4b0e

  • SHA1

    0abf3585968c1ba0e0e0188f2249de35d092ce85

  • SHA256

    bf275eee55190a4315463ca24159e5d44b7a43cd02c70a562647f4834416145c

  • SHA512

    f9b90235f479b4fba38a2f025119e6bbee95c10c853dc5a5f62ddab2b906f57dc7387c8c142cd8405483f7bcb692c98abae53e78e26106c773e62d9e848854dc

  • SSDEEP

    24576:BnyH50JIUwHdnJjn7diUvq/Ph8eMpZTuDYjsRSHhKDCs6taaidTgyc7/3PiA6rEM:Bnq9Jvg/P6j18Cs6cTTrA/a9

Malware Config

Targets

    • Target

      bf275eee55190a4315463ca24159e5d44b7a43cd02c70a562647f4834416145c

    • Size

      1.5MB

    • MD5

      236909d2379c67cff1ec03f0bb4c4b0e

    • SHA1

      0abf3585968c1ba0e0e0188f2249de35d092ce85

    • SHA256

      bf275eee55190a4315463ca24159e5d44b7a43cd02c70a562647f4834416145c

    • SHA512

      f9b90235f479b4fba38a2f025119e6bbee95c10c853dc5a5f62ddab2b906f57dc7387c8c142cd8405483f7bcb692c98abae53e78e26106c773e62d9e848854dc

    • SSDEEP

      24576:BnyH50JIUwHdnJjn7diUvq/Ph8eMpZTuDYjsRSHhKDCs6taaidTgyc7/3PiA6rEM:Bnq9Jvg/P6j18Cs6cTTrA/a9

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks