General

  • Target

    2024-12-15_d10fc57601e9410f1c34be076ffc9297_floxif_mafia

  • Size

    2.0MB

  • Sample

    241215-b16a3ssker

  • MD5

    d10fc57601e9410f1c34be076ffc9297

  • SHA1

    e910a593fbfdaf875f54448684329e0864f8286e

  • SHA256

    a487050796b8b9e5cf2c690218a829537d15ead8df9551a486bed5449b52b36e

  • SHA512

    9ff6892eba8611d4115ade23887d804841637fc392c117cd1a794f27324115a6c92fd7eb859689966e3549c40d335711a27e77e0834f825bd30c0783827196e0

  • SSDEEP

    49152:v1LGMMeYvW26uIwXDPLD4TQ+kjCG9n5gtyvkBT/Wz4HT38jNLQmcZru5IciM:v1LGMMeYvIu5DPLD4TQ+kj95g0vkBT/W

Malware Config

Targets

    • Target

      2024-12-15_d10fc57601e9410f1c34be076ffc9297_floxif_mafia

    • Size

      2.0MB

    • MD5

      d10fc57601e9410f1c34be076ffc9297

    • SHA1

      e910a593fbfdaf875f54448684329e0864f8286e

    • SHA256

      a487050796b8b9e5cf2c690218a829537d15ead8df9551a486bed5449b52b36e

    • SHA512

      9ff6892eba8611d4115ade23887d804841637fc392c117cd1a794f27324115a6c92fd7eb859689966e3549c40d335711a27e77e0834f825bd30c0783827196e0

    • SSDEEP

      49152:v1LGMMeYvW26uIwXDPLD4TQ+kjCG9n5gtyvkBT/Wz4HT38jNLQmcZru5IciM:v1LGMMeYvIu5DPLD4TQ+kj95g0vkBT/W

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks