General

  • Target

    2024-08-02_55751e3fdf60e398de168ee5959b8140_floxif_mafia

  • Size

    2.5MB

  • Sample

    240802-pn3ajs1epe

  • MD5

    55751e3fdf60e398de168ee5959b8140

  • SHA1

    a152bbec2f7d5575faa03003c383a21c10d9f84e

  • SHA256

    911318f72864a420888da9501c284807b2f383403d880def3958e6bc011ea19c

  • SHA512

    b35c4151e56ec9c46a345bc65214bfec32dc2d619eb874876eceb3e50043638af6d31884019b9f129fe8e83542f53869a4fe8e93081f5f0f9a95fe223e896df3

  • SSDEEP

    49152:tu1IKeofs2hPd2l177BTK2VbDsar1YDjQ:tG7fs2hPIl1/X

Malware Config

Targets

    • Target

      2024-08-02_55751e3fdf60e398de168ee5959b8140_floxif_mafia

    • Size

      2.5MB

    • MD5

      55751e3fdf60e398de168ee5959b8140

    • SHA1

      a152bbec2f7d5575faa03003c383a21c10d9f84e

    • SHA256

      911318f72864a420888da9501c284807b2f383403d880def3958e6bc011ea19c

    • SHA512

      b35c4151e56ec9c46a345bc65214bfec32dc2d619eb874876eceb3e50043638af6d31884019b9f129fe8e83542f53869a4fe8e93081f5f0f9a95fe223e896df3

    • SSDEEP

      49152:tu1IKeofs2hPd2l177BTK2VbDsar1YDjQ:tG7fs2hPIl1/X

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks