General

  • Target

    2024-10-11_999c54d1f28488473d606dff922de019_floxif_icedid

  • Size

    2.6MB

  • Sample

    241011-3c151avajn

  • MD5

    999c54d1f28488473d606dff922de019

  • SHA1

    59cedc971282ca87b2c6a05074c61f63c037db17

  • SHA256

    d595ff1a40c6a0cbde4a68a8bc0df85d0392acc1784060f641b2f28656bbfd14

  • SHA512

    193c93e9a0da1a6fdbd62d9b59043c993680326ddeed988dce8899781c97728369b95651290a3ff3da739a07d2e5231b2cdc25efacea3efd19b0d880771972fd

  • SSDEEP

    24576:RpqzhKwykVFLvty85U+PzY0Ff5lAVElV7mTYSllGaqlz0d6PSdTjo8ufJa/zfzkR:RpAhDFy+zWOglvqlz0gQTWfJa/jzkjk2

Malware Config

Targets

    • Target

      2024-10-11_999c54d1f28488473d606dff922de019_floxif_icedid

    • Size

      2.6MB

    • MD5

      999c54d1f28488473d606dff922de019

    • SHA1

      59cedc971282ca87b2c6a05074c61f63c037db17

    • SHA256

      d595ff1a40c6a0cbde4a68a8bc0df85d0392acc1784060f641b2f28656bbfd14

    • SHA512

      193c93e9a0da1a6fdbd62d9b59043c993680326ddeed988dce8899781c97728369b95651290a3ff3da739a07d2e5231b2cdc25efacea3efd19b0d880771972fd

    • SSDEEP

      24576:RpqzhKwykVFLvty85U+PzY0Ff5lAVElV7mTYSllGaqlz0d6PSdTjo8ufJa/zfzkR:RpAhDFy+zWOglvqlz0gQTWfJa/jzkjk2

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks