General

  • Target

    2024-10-06_1dc4cb870a85f91bde49fb664ae285cf_floxif_mafia

  • Size

    2.0MB

  • Sample

    241006-mhmxkaygln

  • MD5

    1dc4cb870a85f91bde49fb664ae285cf

  • SHA1

    c30d04f4715e7d8a69d869923c320186105051e3

  • SHA256

    ab1b8f8f374b0cdfd9a65675237bbfa521cd23947848aca550d30a3ca55e9e34

  • SHA512

    539a3d25c70225a80e6ddacb42d026f01bcd3ea49273b4ba6f5568346242d6a244a206393e7d2a8808371e58d32818765d6c6f93858b2319b8524e2562ae4a42

  • SSDEEP

    49152:vdhqhlwofDBMPjjZejVexwiKVvgU1nymLRxivtAPOUcu8PANuUbKuR9/3ovQtt08:vdhqhlwofDBMPjjZejVexwiKVvgU1ny+

Malware Config

Targets

    • Target

      2024-10-06_1dc4cb870a85f91bde49fb664ae285cf_floxif_mafia

    • Size

      2.0MB

    • MD5

      1dc4cb870a85f91bde49fb664ae285cf

    • SHA1

      c30d04f4715e7d8a69d869923c320186105051e3

    • SHA256

      ab1b8f8f374b0cdfd9a65675237bbfa521cd23947848aca550d30a3ca55e9e34

    • SHA512

      539a3d25c70225a80e6ddacb42d026f01bcd3ea49273b4ba6f5568346242d6a244a206393e7d2a8808371e58d32818765d6c6f93858b2319b8524e2562ae4a42

    • SSDEEP

      49152:vdhqhlwofDBMPjjZejVexwiKVvgU1nymLRxivtAPOUcu8PANuUbKuR9/3ovQtt08:vdhqhlwofDBMPjjZejVexwiKVvgU1ny+

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks