General

  • Target

    272ca396aed147d5c06951916afed69532e264472a12f86d226e9b4c4259ebcb

  • Size

    943KB

  • Sample

    250206-jwexbsyld1

  • MD5

    39afdea733a216c1c6ac417e0bb7e85a

  • SHA1

    d2f113d2a96847d933745874b364f1caf471024f

  • SHA256

    272ca396aed147d5c06951916afed69532e264472a12f86d226e9b4c4259ebcb

  • SHA512

    217964d8e5a9ea94f90ac5adee2d78fbf863fdcd959dd24b6a6b371b36c4469cabfd7fd963d9b60f4f77f62dadc542334639802fc00e116ac3f63b1cdfde6d93

  • SSDEEP

    24576:qOo5yT/tMbHWc8eC9TqOUk12+vm/HIpUqpj1kVlFo1U1QgrEH7R9I:qOowTKbHqlcfInpJkDGAQx9I

Malware Config

Targets

    • Target

      272ca396aed147d5c06951916afed69532e264472a12f86d226e9b4c4259ebcb

    • Size

      943KB

    • MD5

      39afdea733a216c1c6ac417e0bb7e85a

    • SHA1

      d2f113d2a96847d933745874b364f1caf471024f

    • SHA256

      272ca396aed147d5c06951916afed69532e264472a12f86d226e9b4c4259ebcb

    • SHA512

      217964d8e5a9ea94f90ac5adee2d78fbf863fdcd959dd24b6a6b371b36c4469cabfd7fd963d9b60f4f77f62dadc542334639802fc00e116ac3f63b1cdfde6d93

    • SSDEEP

      24576:qOo5yT/tMbHWc8eC9TqOUk12+vm/HIpUqpj1kVlFo1U1QgrEH7R9I:qOowTKbHqlcfInpJkDGAQx9I

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks