General

  • Target

    a8db67d84fa14c444824843dbc843b3412b5398a192c5e44d6ab6b892dd6f9a1

  • Size

    286KB

  • Sample

    250208-h5pmfstndp

  • MD5

    33d761daf3f8e1d77b19f607872f0130

  • SHA1

    69611fd1f8f7935d19a0532ceedc1fc7e9bb4ee0

  • SHA256

    a8db67d84fa14c444824843dbc843b3412b5398a192c5e44d6ab6b892dd6f9a1

  • SHA512

    8e6d06e552253dacd3c402d50c6cfa21d7645869708cc85dc226ef0a136f99e54f8d8c3d8a72e4e9b4400582ea91c0a15ad80307b91e64ddb7f814dacc2df086

  • SSDEEP

    6144:zIp7gKNkhSR/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKr6kq7:zG7gKNkhm/JuyXnPB+h8WHlBjvrEH7qA

Malware Config

Targets

    • Target

      a8db67d84fa14c444824843dbc843b3412b5398a192c5e44d6ab6b892dd6f9a1

    • Size

      286KB

    • MD5

      33d761daf3f8e1d77b19f607872f0130

    • SHA1

      69611fd1f8f7935d19a0532ceedc1fc7e9bb4ee0

    • SHA256

      a8db67d84fa14c444824843dbc843b3412b5398a192c5e44d6ab6b892dd6f9a1

    • SHA512

      8e6d06e552253dacd3c402d50c6cfa21d7645869708cc85dc226ef0a136f99e54f8d8c3d8a72e4e9b4400582ea91c0a15ad80307b91e64ddb7f814dacc2df086

    • SSDEEP

      6144:zIp7gKNkhSR/5kHouyXnZhB+h8WHlBV+UdvrEFp7hKr6kq7:zG7gKNkhm/JuyXnPB+h8WHlBjvrEH7qA

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks