General

  • Target

    2024-12-11_a88746b6639efba9230dc8f19c710797_floxif_mafia

  • Size

    2.4MB

  • Sample

    241211-bxfk9atmhl

  • MD5

    a88746b6639efba9230dc8f19c710797

  • SHA1

    f73cfff5c79f366842d1058e2a3b12f81be37fbe

  • SHA256

    c11380b0c7c2ac4ec52c56c68d2c8fca564505d9a22de89e9e9ce3bf739c3699

  • SHA512

    5c678e6f303f54cd3394563dab6f494196b114f2285370bda3ad2c449de6c740c47f5e0b0dd8015de03b867f560da04e141c2996fd7d8e97bc5f64f9e33873bc

  • SSDEEP

    49152:M3uE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qk:FE7AfrlyutLxC3sEwwM3Uk

Malware Config

Targets

    • Target

      2024-12-11_a88746b6639efba9230dc8f19c710797_floxif_mafia

    • Size

      2.4MB

    • MD5

      a88746b6639efba9230dc8f19c710797

    • SHA1

      f73cfff5c79f366842d1058e2a3b12f81be37fbe

    • SHA256

      c11380b0c7c2ac4ec52c56c68d2c8fca564505d9a22de89e9e9ce3bf739c3699

    • SHA512

      5c678e6f303f54cd3394563dab6f494196b114f2285370bda3ad2c449de6c740c47f5e0b0dd8015de03b867f560da04e141c2996fd7d8e97bc5f64f9e33873bc

    • SSDEEP

      49152:M3uE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qk:FE7AfrlyutLxC3sEwwM3Uk

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks