General

  • Target

    2024-12-15_3b41dd5b87d10fba6ac4ca604b35f966_floxif_mafia

  • Size

    2.5MB

  • Sample

    241215-dw5j4atrhm

  • MD5

    3b41dd5b87d10fba6ac4ca604b35f966

  • SHA1

    5db6aa9c2e392cfaf73fa5908f1989f28e7a4124

  • SHA256

    34f1cc6c173b9fa047fbfa69b0d190e9907b0d621253c5f6d3c4821ab8eaf38b

  • SHA512

    6d0ecb4fd2a70e9f7a40a6d15cbffced5aa3f1a8a4371f997cd351d8d3d719ba0f39d4f866641a4a53ca78ca0cd7720d3c8c7bc50ffe161ddb451e8a5c633602

  • SSDEEP

    49152:pmhcbMDOyZLivN3iKVqOw7XYym7U4aFvsO1CThFhu7vLruwqf+tu:pmpiyZuvN3eOw7XSU4aFvsO1X7vK

Malware Config

Targets

    • Target

      2024-12-15_3b41dd5b87d10fba6ac4ca604b35f966_floxif_mafia

    • Size

      2.5MB

    • MD5

      3b41dd5b87d10fba6ac4ca604b35f966

    • SHA1

      5db6aa9c2e392cfaf73fa5908f1989f28e7a4124

    • SHA256

      34f1cc6c173b9fa047fbfa69b0d190e9907b0d621253c5f6d3c4821ab8eaf38b

    • SHA512

      6d0ecb4fd2a70e9f7a40a6d15cbffced5aa3f1a8a4371f997cd351d8d3d719ba0f39d4f866641a4a53ca78ca0cd7720d3c8c7bc50ffe161ddb451e8a5c633602

    • SSDEEP

      49152:pmhcbMDOyZLivN3iKVqOw7XYym7U4aFvsO1CThFhu7vLruwqf+tu:pmpiyZuvN3eOw7XSU4aFvsO1X7vK

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks