General

  • Target

    2024-12-16_724627f5ddfdd4b81f365d74a94a9786_floxif_mafia

  • Size

    2.4MB

  • Sample

    241216-aw35gswqfq

  • MD5

    724627f5ddfdd4b81f365d74a94a9786

  • SHA1

    cae440c39d4c19213964d856419ee35a2bc05559

  • SHA256

    7acf0546772c51be9275f3d173d81af095cfaaf86c4a1d1c482c463d724c69f7

  • SHA512

    a942349ae5afd5b757ad68ec4c1731e2f5a79481c7a81bd25218064fbbc868e3f840739a8efe734b9d52222d435d2f69f4973bdd428883788faffd2967fee019

  • SSDEEP

    49152:23uE7ACqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qF:zE7A9rlyutLxC3sEwwM3UF

Malware Config

Targets

    • Target

      2024-12-16_724627f5ddfdd4b81f365d74a94a9786_floxif_mafia

    • Size

      2.4MB

    • MD5

      724627f5ddfdd4b81f365d74a94a9786

    • SHA1

      cae440c39d4c19213964d856419ee35a2bc05559

    • SHA256

      7acf0546772c51be9275f3d173d81af095cfaaf86c4a1d1c482c463d724c69f7

    • SHA512

      a942349ae5afd5b757ad68ec4c1731e2f5a79481c7a81bd25218064fbbc868e3f840739a8efe734b9d52222d435d2f69f4973bdd428883788faffd2967fee019

    • SSDEEP

      49152:23uE7ACqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qF:zE7A9rlyutLxC3sEwwM3UF

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks