General

  • Target

    e15a34af8596dbb3b4f88968bbf6e892a1f193abf5906fb26c0e7c2d9ccdf9a1

  • Size

    2.7MB

  • Sample

    250208-tvp11swmhl

  • MD5

    0bacd8621b781a35693e3f23ef8cb423

  • SHA1

    94d6637ca3e75f659e5a74e9bf1f89b354119c30

  • SHA256

    e15a34af8596dbb3b4f88968bbf6e892a1f193abf5906fb26c0e7c2d9ccdf9a1

  • SHA512

    044888be9caa25dfa923f1fa4d66985b9175a83512779b4ef46fda33663f6dd5d695f8091085a0a025ad88a3993e028409b24120776f9e2c90c57e38529e73f1

  • SSDEEP

    49152:2Pf6VdMQTNRbc3shkNw//7vgseqziRS1UsrzoeNFZe05c71y9Bx4M3W/KMZKWKKT:2q1R43ssw//7vgVqziRS1Usrzppv5y1N

Malware Config

Targets

    • Target

      e15a34af8596dbb3b4f88968bbf6e892a1f193abf5906fb26c0e7c2d9ccdf9a1

    • Size

      2.7MB

    • MD5

      0bacd8621b781a35693e3f23ef8cb423

    • SHA1

      94d6637ca3e75f659e5a74e9bf1f89b354119c30

    • SHA256

      e15a34af8596dbb3b4f88968bbf6e892a1f193abf5906fb26c0e7c2d9ccdf9a1

    • SHA512

      044888be9caa25dfa923f1fa4d66985b9175a83512779b4ef46fda33663f6dd5d695f8091085a0a025ad88a3993e028409b24120776f9e2c90c57e38529e73f1

    • SSDEEP

      49152:2Pf6VdMQTNRbc3shkNw//7vgseqziRS1UsrzoeNFZe05c71y9Bx4M3W/KMZKWKKT:2q1R43ssw//7vgVqziRS1Usrzppv5y1N

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks