General

  • Target

    f9cb8d2b57e0b2901e9fb30d07c484cb190028d5c97af0a2d360eabe74987818

  • Size

    201KB

  • Sample

    250218-j9tmmsypgn

  • MD5

    5413c431c8d3fd58740a7e72ff7e7198

  • SHA1

    e3a0c4ccaec82caa0a3d809c641797638e65acb8

  • SHA256

    f9cb8d2b57e0b2901e9fb30d07c484cb190028d5c97af0a2d360eabe74987818

  • SHA512

    c0243f5d407877bdff40f91cbc03b76d0f890292d24c3ee408214d0bebf354d44f6b458a6bcbd501d4c59d17f9c6bfbe3cf9eea1c830eee6ea89f13b603cdc6f

  • SSDEEP

    6144:LnpE/c98fkmuRr+eI8BV+UdvrEFp7hKjlM:f8cmuRrdI8BjvrEH7cM

Malware Config

Targets

    • Target

      f9cb8d2b57e0b2901e9fb30d07c484cb190028d5c97af0a2d360eabe74987818

    • Size

      201KB

    • MD5

      5413c431c8d3fd58740a7e72ff7e7198

    • SHA1

      e3a0c4ccaec82caa0a3d809c641797638e65acb8

    • SHA256

      f9cb8d2b57e0b2901e9fb30d07c484cb190028d5c97af0a2d360eabe74987818

    • SHA512

      c0243f5d407877bdff40f91cbc03b76d0f890292d24c3ee408214d0bebf354d44f6b458a6bcbd501d4c59d17f9c6bfbe3cf9eea1c830eee6ea89f13b603cdc6f

    • SSDEEP

      6144:LnpE/c98fkmuRr+eI8BV+UdvrEFp7hKjlM:f8cmuRrdI8BjvrEH7cM

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks