General

  • Target

    ecad1c1443e614bd81e0ce04896301d73c0b80f74bbc2c369cd4c91b17b30288

  • Size

    278KB

  • Sample

    250209-gjeppaymak

  • MD5

    1688618419d4883f7e6a5a70bf4afb44

  • SHA1

    063662e79f851ca917b18fa7de4be1061e92d4fa

  • SHA256

    ecad1c1443e614bd81e0ce04896301d73c0b80f74bbc2c369cd4c91b17b30288

  • SHA512

    244582e92fc6eecbd393a10462742f847149746d5d7695ef9f3c9d59fb91a5da40f03176f92ef4490e611754a2aac3717dcb014cb225e93518457f01186488a0

  • SSDEEP

    6144:DA+l/DR9XC3dM7B+GCzBV+UdvrEFp7hKDS:DA+lbR9G6B+GCzBjvrEH7aS

Malware Config

Targets

    • Target

      ecad1c1443e614bd81e0ce04896301d73c0b80f74bbc2c369cd4c91b17b30288

    • Size

      278KB

    • MD5

      1688618419d4883f7e6a5a70bf4afb44

    • SHA1

      063662e79f851ca917b18fa7de4be1061e92d4fa

    • SHA256

      ecad1c1443e614bd81e0ce04896301d73c0b80f74bbc2c369cd4c91b17b30288

    • SHA512

      244582e92fc6eecbd393a10462742f847149746d5d7695ef9f3c9d59fb91a5da40f03176f92ef4490e611754a2aac3717dcb014cb225e93518457f01186488a0

    • SSDEEP

      6144:DA+l/DR9XC3dM7B+GCzBV+UdvrEFp7hKDS:DA+lbR9G6B+GCzBjvrEH7aS

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks