General

  • Target

    2024-12-10_50795b684000a25dad865a09be39d5ac_floxif_mafia

  • Size

    1.8MB

  • Sample

    241210-pm5z2szqhp

  • MD5

    50795b684000a25dad865a09be39d5ac

  • SHA1

    849518b3a4a1a0af5a14de32945538d7ce258b15

  • SHA256

    79056ee2ed070c708a1639843bdd14d574d7d0007e4f1bbe11b01a0a9ad014aa

  • SHA512

    ea01f9b96256839d2910bc9c4c52a65f2c5d46db902f5e20329af8464777e6af934f847359e15aaf1c83240ca3e446a5a1f2a56eaf0cb48914bbcfb253d22261

  • SSDEEP

    49152:mSRFWpiINDnQOklug56b5KEZccMqR2OdWc9hK/9pjDgO/rF9sSV2Rc:mwWpiINnGll6b5KEO5qR9dWP/9pQO/rR

Malware Config

Targets

    • Target

      2024-12-10_50795b684000a25dad865a09be39d5ac_floxif_mafia

    • Size

      1.8MB

    • MD5

      50795b684000a25dad865a09be39d5ac

    • SHA1

      849518b3a4a1a0af5a14de32945538d7ce258b15

    • SHA256

      79056ee2ed070c708a1639843bdd14d574d7d0007e4f1bbe11b01a0a9ad014aa

    • SHA512

      ea01f9b96256839d2910bc9c4c52a65f2c5d46db902f5e20329af8464777e6af934f847359e15aaf1c83240ca3e446a5a1f2a56eaf0cb48914bbcfb253d22261

    • SSDEEP

      49152:mSRFWpiINDnQOklug56b5KEZccMqR2OdWc9hK/9pjDgO/rF9sSV2Rc:mwWpiINnGll6b5KEO5qR9dWP/9pQO/rR

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks