Resubmissions

23/04/2025, 19:37

250423-yb821axzds 3

23/04/2025, 19:29

250423-x7rbdsxyb1 10

General

  • Target

    perltonode.js

  • Size

    6KB

  • Sample

    250423-x7rbdsxyb1

  • MD5

    861be769b12e6b30a35abf653174c162

  • SHA1

    cb3a130953157378408543a12b8030cf3ff22245

  • SHA256

    af1f9f8dba2d92b69457c946d82f73dd9600d1cb3cc70220dc1e97ffd3e8cf16

  • SHA512

    77b3bdee3d930782690649feb27e07c3ca3182eae8a8d14259fbf1432a17f16a92bf26dc11a48f061765fc5f8c0f4797e0bedee1526d45488943e49f07f5f416

  • SSDEEP

    192:ba+A1/P+zqyOq8KF4N6qzKwkzlSFwi/x8Osz:ERGqyB8KeB+1S+Uyl

Malware Config

Targets

    • Target

      perltonode.js

    • Size

      6KB

    • MD5

      861be769b12e6b30a35abf653174c162

    • SHA1

      cb3a130953157378408543a12b8030cf3ff22245

    • SHA256

      af1f9f8dba2d92b69457c946d82f73dd9600d1cb3cc70220dc1e97ffd3e8cf16

    • SHA512

      77b3bdee3d930782690649feb27e07c3ca3182eae8a8d14259fbf1432a17f16a92bf26dc11a48f061765fc5f8c0f4797e0bedee1526d45488943e49f07f5f416

    • SSDEEP

      192:ba+A1/P+zqyOq8KF4N6qzKwkzlSFwi/x8Osz:ERGqyB8KeB+1S+Uyl

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Modifies WinLogon for persistence

    • Detects Floxif payload

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Detected potential entity reuse from brand MICROSOFT.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks