General

  • Target

    2024-12-13_7ad11d04d29aace292d88f55302eb09e_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    241213-pndxysykdv

  • MD5

    7ad11d04d29aace292d88f55302eb09e

  • SHA1

    2e840bdd82b138ab4107e34d041c37f7db2147f1

  • SHA256

    7780d08dcbf166e44d808cb6eba54097a2a05a1368bf66d1369d69641035e255

  • SHA512

    bd73116c3452b3ea6ed22afaae604b802d62b221eb505729541f2c72ae2f7e3abd12d1d6d8bea9d13317d9fa24ebaf9cb9d4a751b051da432a58b3c6cba4cc57

  • SSDEEP

    49152:KaSofyDdWWqJXTmvQojZ2toFPVmyN8yrOR23P2yYI1y7B5lcdtH9jR9W/KMZKWKg:LudEmQoMtoFPVmyN8yrOR23O8A77lcdc

Malware Config

Targets

    • Target

      2024-12-13_7ad11d04d29aace292d88f55302eb09e_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      7ad11d04d29aace292d88f55302eb09e

    • SHA1

      2e840bdd82b138ab4107e34d041c37f7db2147f1

    • SHA256

      7780d08dcbf166e44d808cb6eba54097a2a05a1368bf66d1369d69641035e255

    • SHA512

      bd73116c3452b3ea6ed22afaae604b802d62b221eb505729541f2c72ae2f7e3abd12d1d6d8bea9d13317d9fa24ebaf9cb9d4a751b051da432a58b3c6cba4cc57

    • SSDEEP

      49152:KaSofyDdWWqJXTmvQojZ2toFPVmyN8yrOR23P2yYI1y7B5lcdtH9jR9W/KMZKWKg:LudEmQoMtoFPVmyN8yrOR23O8A77lcdc

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks