General

  • Target

    2024-12-12_951cf2d701d269abbb9b8cce20302e70_bkransomware_floxif_hijackloader_icedid_luca-stealer

  • Size

    35.2MB

  • Sample

    241212-aszynatpbz

  • MD5

    951cf2d701d269abbb9b8cce20302e70

  • SHA1

    39f82796e1bd8925aae38be15fd3f9b95dbb82fa

  • SHA256

    08847ffb9af9125848b0fbb430ef4c1a25e47e971e57383ca933a645f7dbf470

  • SHA512

    ef2d2319bf5965161d68191d10889b16e9593e74fbd1528c6183fdd5c5c58334c16c5891a32692315eccf22d0b25d3ccf4472555e55e39b1a2c9a516a3f71c9f

  • SSDEEP

    196608:Ks1X7ZCXnao5D9P9CEaSfi7fkElaucB+MJrfcWx1yl02CCunv/YjDF+JUvkxgzNe:Ks1QXFKSfi7cElYutvkxCEdDGm5ht

Malware Config

Targets

    • Target

      2024-12-12_951cf2d701d269abbb9b8cce20302e70_bkransomware_floxif_hijackloader_icedid_luca-stealer

    • Size

      35.2MB

    • MD5

      951cf2d701d269abbb9b8cce20302e70

    • SHA1

      39f82796e1bd8925aae38be15fd3f9b95dbb82fa

    • SHA256

      08847ffb9af9125848b0fbb430ef4c1a25e47e971e57383ca933a645f7dbf470

    • SHA512

      ef2d2319bf5965161d68191d10889b16e9593e74fbd1528c6183fdd5c5c58334c16c5891a32692315eccf22d0b25d3ccf4472555e55e39b1a2c9a516a3f71c9f

    • SSDEEP

      196608:Ks1X7ZCXnao5D9P9CEaSfi7fkElaucB+MJrfcWx1yl02CCunv/YjDF+JUvkxgzNe:Ks1QXFKSfi7cElYutvkxCEdDGm5ht

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks