General

  • Target

    2024-10-02_f05a1d17a081904316011b15afd6aac0_floxif_hijackloader_icedid

  • Size

    2.1MB

  • Sample

    241002-bxt4mszhpj

  • MD5

    f05a1d17a081904316011b15afd6aac0

  • SHA1

    a2997679b3e0d09d39266df04b53eaee3ec4eb54

  • SHA256

    4fdc3a8b99395949fef121dc6fbc46f780269833f2e8c561c001dd45f2e69cc8

  • SHA512

    0443d665c6f6b8f0ae2e2a65fbd8f0ca70c56c9d921139001de57284a0cfc19b8cf860df123b07f1d33d7d13b434136661121fdc1ddcff15338b8a96507cde77

  • SSDEEP

    49152:V8PsZNCHFOAxh7f1fLtfxaPZXbuo3j5Xps:uPsZuFOA3fxaPhbuo3j5Xps

Malware Config

Targets

    • Target

      2024-10-02_f05a1d17a081904316011b15afd6aac0_floxif_hijackloader_icedid

    • Size

      2.1MB

    • MD5

      f05a1d17a081904316011b15afd6aac0

    • SHA1

      a2997679b3e0d09d39266df04b53eaee3ec4eb54

    • SHA256

      4fdc3a8b99395949fef121dc6fbc46f780269833f2e8c561c001dd45f2e69cc8

    • SHA512

      0443d665c6f6b8f0ae2e2a65fbd8f0ca70c56c9d921139001de57284a0cfc19b8cf860df123b07f1d33d7d13b434136661121fdc1ddcff15338b8a96507cde77

    • SSDEEP

      49152:V8PsZNCHFOAxh7f1fLtfxaPZXbuo3j5Xps:uPsZuFOA3fxaPhbuo3j5Xps

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks