General

  • Target

    e49fd3d882434a25f93efed626149fe8be0deb41ba31c1f7e86603f13e722162

  • Size

    811KB

  • Sample

    250206-gys6maxmem

  • MD5

    a6790f260c6de29549bb573c090fdc0b

  • SHA1

    f49a47513bf0899611068deccf4be5f8b0111fda

  • SHA256

    e49fd3d882434a25f93efed626149fe8be0deb41ba31c1f7e86603f13e722162

  • SHA512

    caa808b614a32190a6d1515d61bf607b135f671c727be5a9ece4c3c96118863f05834584828fe4cf2d199341a877019f8b004baae9c3c21a57eaa111d80d1a3d

  • SSDEEP

    24576:tOoTyCXwZtP7SJoR3MsXxuLHgH1KrEH7h:YCXgDSJUVeH+1r

Malware Config

Targets

    • Target

      e49fd3d882434a25f93efed626149fe8be0deb41ba31c1f7e86603f13e722162

    • Size

      811KB

    • MD5

      a6790f260c6de29549bb573c090fdc0b

    • SHA1

      f49a47513bf0899611068deccf4be5f8b0111fda

    • SHA256

      e49fd3d882434a25f93efed626149fe8be0deb41ba31c1f7e86603f13e722162

    • SHA512

      caa808b614a32190a6d1515d61bf607b135f671c727be5a9ece4c3c96118863f05834584828fe4cf2d199341a877019f8b004baae9c3c21a57eaa111d80d1a3d

    • SSDEEP

      24576:tOoTyCXwZtP7SJoR3MsXxuLHgH1KrEH7h:YCXgDSJUVeH+1r

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks