General

  • Target

    2024-11-18_11cfe89fd42c9ed54e955c77b6799b8e_floxif_frostygoop_snatch

  • Size

    3.6MB

  • Sample

    241118-xlk79atbqm

  • MD5

    11cfe89fd42c9ed54e955c77b6799b8e

  • SHA1

    516773ca844849584238dac4c23a974d3263dc2b

  • SHA256

    6e6b7cd253336a9c79720b683fe5af17f129537a68186dfa7d0456d7d71a97a1

  • SHA512

    30a67295310338d8dcd65e07fe9f56fc6209e7da999a1e89c57fc564cc68d7e0feec0e21344154c484e11bc98d0ae3647667fe7a2adefc8ed2f00307db79e06e

  • SSDEEP

    49152:VRs2F1IKqvQtcme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZl:zs2Mpycme4fOTwq2iOLkQml

Malware Config

Targets

    • Target

      2024-11-18_11cfe89fd42c9ed54e955c77b6799b8e_floxif_frostygoop_snatch

    • Size

      3.6MB

    • MD5

      11cfe89fd42c9ed54e955c77b6799b8e

    • SHA1

      516773ca844849584238dac4c23a974d3263dc2b

    • SHA256

      6e6b7cd253336a9c79720b683fe5af17f129537a68186dfa7d0456d7d71a97a1

    • SHA512

      30a67295310338d8dcd65e07fe9f56fc6209e7da999a1e89c57fc564cc68d7e0feec0e21344154c484e11bc98d0ae3647667fe7a2adefc8ed2f00307db79e06e

    • SSDEEP

      49152:VRs2F1IKqvQtcme4s5LVc/fp18n5Igsxjq2iOIr+3r4ArUZl:zs2Mpycme4fOTwq2iOLkQml

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks