General

  • Target

    2024-09-05_74b6b8da4ddb13386db2f42d68529bf5_floxif_mafia

  • Size

    3.4MB

  • Sample

    240905-pqgrma1gpc

  • MD5

    74b6b8da4ddb13386db2f42d68529bf5

  • SHA1

    885ad6a1884f03b23a44078b187b2bc0a42e3415

  • SHA256

    5c47bb2065ca1d9882ca3b7ea6f48ee9c374406bf625dc550248d4d0c8cbdf29

  • SHA512

    c360a6e20c315aa2a47bd87a231ebbc03587809acc15375c0f4b3e84bc17ca8dbb64f19f1526390b6d7532f96065f4b911fda07e88b4a4b3100b1a96bb78dfc5

  • SSDEEP

    98304:vQIQ7n4g8L1ZRER+7b6MYkjMhGs7qKnX341lfc4X:II9g8RTsZAs7qKn4vXX

Malware Config

Targets

    • Target

      2024-09-05_74b6b8da4ddb13386db2f42d68529bf5_floxif_mafia

    • Size

      3.4MB

    • MD5

      74b6b8da4ddb13386db2f42d68529bf5

    • SHA1

      885ad6a1884f03b23a44078b187b2bc0a42e3415

    • SHA256

      5c47bb2065ca1d9882ca3b7ea6f48ee9c374406bf625dc550248d4d0c8cbdf29

    • SHA512

      c360a6e20c315aa2a47bd87a231ebbc03587809acc15375c0f4b3e84bc17ca8dbb64f19f1526390b6d7532f96065f4b911fda07e88b4a4b3100b1a96bb78dfc5

    • SSDEEP

      98304:vQIQ7n4g8L1ZRER+7b6MYkjMhGs7qKnX341lfc4X:II9g8RTsZAs7qKn4vXX

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks