General

  • Target

    2024-11-21_04870ef8d61fb27e1df5512bf7070799_floxif_icedid_silence

  • Size

    1.6MB

  • Sample

    241121-pkfx5ssfrp

  • MD5

    04870ef8d61fb27e1df5512bf7070799

  • SHA1

    ae187ffb1b45d8285b6c35ff7332afd6a4f05247

  • SHA256

    5e5f2309f10076154b45802f3393e57db4c9f7b6495a0123a5c0264a73ced06a

  • SHA512

    65eb5ecc4cec07b1c91b2f3e733b3f5002021df29d279f1b416a44812da5874e95bb3c2f099f9c643b85fa62818c8ff1374e6186cd7ca675035ba7faf163cc56

  • SSDEEP

    49152:MunAc+DJxMSI8V+qH4MQjffRKku8r4qk5a7sCWeyNwZ:MoAc+DJxtI8VxHyffkku8rD/7sCWeyN8

Malware Config

Targets

    • Target

      2024-11-21_04870ef8d61fb27e1df5512bf7070799_floxif_icedid_silence

    • Size

      1.6MB

    • MD5

      04870ef8d61fb27e1df5512bf7070799

    • SHA1

      ae187ffb1b45d8285b6c35ff7332afd6a4f05247

    • SHA256

      5e5f2309f10076154b45802f3393e57db4c9f7b6495a0123a5c0264a73ced06a

    • SHA512

      65eb5ecc4cec07b1c91b2f3e733b3f5002021df29d279f1b416a44812da5874e95bb3c2f099f9c643b85fa62818c8ff1374e6186cd7ca675035ba7faf163cc56

    • SSDEEP

      49152:MunAc+DJxMSI8V+qH4MQjffRKku8r4qk5a7sCWeyNwZ:MoAc+DJxtI8VxHyffkku8rD/7sCWeyN8

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks