General

  • Target

    2024-11-21_0b6d9b9cf86cfd0669374d2b0c4c8893_floxif_frostygoop_hijackloader_poet-rat_snatch_zxxz

  • Size

    17.9MB

  • Sample

    241121-rrbywatbpn

  • MD5

    0b6d9b9cf86cfd0669374d2b0c4c8893

  • SHA1

    eeda4797696584077dfec83a6f12e229068b31c5

  • SHA256

    c70aa5b3e9fe44fec1305b7ac25f33ee9cc1e52a3c4c54e1611f325f4f005d7f

  • SHA512

    17cecd4090f2e79149371f51bdb9b1ca95477a1d4a9cdfbfa2fb1ead467d755e18e15d4395df3d4cab2f3c270916661a95e752f1472020dd05c465536e1a9e5f

  • SSDEEP

    98304:FMWhYnBg1d4oUyi2D5jyW/bxkHWvlS0mTK8/WNMtz9f/BILO9qT798Oit/bkR9vs:OWGJ814NjONUWeiHit/bcVsuBg07pbA9

Malware Config

Targets

    • Target

      2024-11-21_0b6d9b9cf86cfd0669374d2b0c4c8893_floxif_frostygoop_hijackloader_poet-rat_snatch_zxxz

    • Size

      17.9MB

    • MD5

      0b6d9b9cf86cfd0669374d2b0c4c8893

    • SHA1

      eeda4797696584077dfec83a6f12e229068b31c5

    • SHA256

      c70aa5b3e9fe44fec1305b7ac25f33ee9cc1e52a3c4c54e1611f325f4f005d7f

    • SHA512

      17cecd4090f2e79149371f51bdb9b1ca95477a1d4a9cdfbfa2fb1ead467d755e18e15d4395df3d4cab2f3c270916661a95e752f1472020dd05c465536e1a9e5f

    • SSDEEP

      98304:FMWhYnBg1d4oUyi2D5jyW/bxkHWvlS0mTK8/WNMtz9f/BILO9qT798Oit/bkR9vs:OWGJ814NjONUWeiHit/bcVsuBg07pbA9

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks