General

  • Target

    2024-10-02_9508d6e6ab371c2a6dda13a1e3facd66_floxif_mafia

  • Size

    2.5MB

  • Sample

    241002-e38qrsxcmm

  • MD5

    9508d6e6ab371c2a6dda13a1e3facd66

  • SHA1

    a63e32dabd4ce3b3ec80af112483bce4ef64c71e

  • SHA256

    9ea04a98296a6ff01095deacb5c07e05d1e734535bc5b0629b560f751217fa7d

  • SHA512

    b039c6946db41d377c11d43320227e8f632bdd07a238076b3b48640f020b52e83b77a60f50ac45911a96d646bd5d6ef10f4f42d5efa2ac5416085c964325688a

  • SSDEEP

    49152:pmhcbMDOyZLivN3iK8qOw7XYym7p4aFvsO1CThFhu7vLruwqf+tR:pmpiyZuvN3DOw7XSp4aFvsO1X7vt

Malware Config

Targets

    • Target

      2024-10-02_9508d6e6ab371c2a6dda13a1e3facd66_floxif_mafia

    • Size

      2.5MB

    • MD5

      9508d6e6ab371c2a6dda13a1e3facd66

    • SHA1

      a63e32dabd4ce3b3ec80af112483bce4ef64c71e

    • SHA256

      9ea04a98296a6ff01095deacb5c07e05d1e734535bc5b0629b560f751217fa7d

    • SHA512

      b039c6946db41d377c11d43320227e8f632bdd07a238076b3b48640f020b52e83b77a60f50ac45911a96d646bd5d6ef10f4f42d5efa2ac5416085c964325688a

    • SSDEEP

      49152:pmhcbMDOyZLivN3iK8qOw7XYym7p4aFvsO1CThFhu7vLruwqf+tR:pmpiyZuvN3DOw7XSp4aFvsO1X7vt

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks