General

  • Target

    2024-10-17_d882edf9617b0f0f522f39b40e6a5de6_floxif_mafia

  • Size

    2.5MB

  • Sample

    241017-rjzd7stfqn

  • MD5

    d882edf9617b0f0f522f39b40e6a5de6

  • SHA1

    eaea57cec34f3a0c5dbf18f121a6765d84f60e4c

  • SHA256

    b6dce55dc2756b77395bf8799e91b9e6abf2570441bfc2de7875c6f2d0cb929b

  • SHA512

    f20bfa2a76b26d3e9a1a2d9f6307913f628a137ec957ca65d5439e043fe31e6bbc1de33ec57d473bbda3d066c4bd9d02f4c14c4905dca82b29f3dc12172b40bf

  • SSDEEP

    49152:+uIIKpofs2hPd2l177BTK2VbDsar1YDj6:+jEfs2hPIl1/V

Malware Config

Targets

    • Target

      2024-10-17_d882edf9617b0f0f522f39b40e6a5de6_floxif_mafia

    • Size

      2.5MB

    • MD5

      d882edf9617b0f0f522f39b40e6a5de6

    • SHA1

      eaea57cec34f3a0c5dbf18f121a6765d84f60e4c

    • SHA256

      b6dce55dc2756b77395bf8799e91b9e6abf2570441bfc2de7875c6f2d0cb929b

    • SHA512

      f20bfa2a76b26d3e9a1a2d9f6307913f628a137ec957ca65d5439e043fe31e6bbc1de33ec57d473bbda3d066c4bd9d02f4c14c4905dca82b29f3dc12172b40bf

    • SSDEEP

      49152:+uIIKpofs2hPd2l177BTK2VbDsar1YDj6:+jEfs2hPIl1/V

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks