General

  • Target

    2024-12-11_6627588e4275ec88f84fc6f39d201837_floxif_magniber

  • Size

    11.9MB

  • Sample

    241211-bvf41aypft

  • MD5

    6627588e4275ec88f84fc6f39d201837

  • SHA1

    6e3d1b89ed58efbfeec2407c2edd5e9f6f6cf7cb

  • SHA256

    258e965bbae7a02316d79323e6f955c8dd772fca70c68cde6b8c4e56f17ae5fe

  • SHA512

    a0b61b6f4ae55b19e2d92c2091bdfb088ae3dcaf1be362722f2605a1f5b75e6b488f1e1391cca933059f109ededaaaf3ec4a3361bdcf4528529e20abf51ef5d1

  • SSDEEP

    196608:I+XXXaRbXeZ0f1vwnFzOSoQ33snJuokGef6z:I+6RbuqtvwnFWDz

Malware Config

Targets

    • Target

      2024-12-11_6627588e4275ec88f84fc6f39d201837_floxif_magniber

    • Size

      11.9MB

    • MD5

      6627588e4275ec88f84fc6f39d201837

    • SHA1

      6e3d1b89ed58efbfeec2407c2edd5e9f6f6cf7cb

    • SHA256

      258e965bbae7a02316d79323e6f955c8dd772fca70c68cde6b8c4e56f17ae5fe

    • SHA512

      a0b61b6f4ae55b19e2d92c2091bdfb088ae3dcaf1be362722f2605a1f5b75e6b488f1e1391cca933059f109ededaaaf3ec4a3361bdcf4528529e20abf51ef5d1

    • SSDEEP

      196608:I+XXXaRbXeZ0f1vwnFzOSoQ33snJuokGef6z:I+6RbuqtvwnFWDz

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks