General

  • Target

    2024-08-23_df3442090dc9d7da1c52436f5dec2fff_floxif_mafia

  • Size

    1.8MB

  • Sample

    240823-198v1azglb

  • MD5

    df3442090dc9d7da1c52436f5dec2fff

  • SHA1

    62675560d38af99f5ddd64bf13084422a404a3e4

  • SHA256

    8bd40ae225e79f4ff825ef6f6d09c7401cc3f4f21c1c216d42c8d2446c6c1ee1

  • SHA512

    6d7dd68a72dad2beacf060cc9c26e2665607a4805f8bef6ae2114489e45456e140a79cb6c1e7b5db132506601975b792d4abe537ad94ac1bf43ffc5bd460f0be

  • SSDEEP

    49152:OpEKgw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2YijiS:+wYJYk

Malware Config

Targets

    • Target

      2024-08-23_df3442090dc9d7da1c52436f5dec2fff_floxif_mafia

    • Size

      1.8MB

    • MD5

      df3442090dc9d7da1c52436f5dec2fff

    • SHA1

      62675560d38af99f5ddd64bf13084422a404a3e4

    • SHA256

      8bd40ae225e79f4ff825ef6f6d09c7401cc3f4f21c1c216d42c8d2446c6c1ee1

    • SHA512

      6d7dd68a72dad2beacf060cc9c26e2665607a4805f8bef6ae2114489e45456e140a79cb6c1e7b5db132506601975b792d4abe537ad94ac1bf43ffc5bd460f0be

    • SSDEEP

      49152:OpEKgw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2YijiS:+wYJYk

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks