General

  • Target

    2024-12-17_44cbedae3850a308fb960fa71f1fb12f_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    241217-pn3w3syqfw

  • MD5

    44cbedae3850a308fb960fa71f1fb12f

  • SHA1

    3363367a8b6b9e8e4a9934c56045c8b136cd20af

  • SHA256

    eeda62c0b33b1c3fcdb4f7970300bc5f30dcc07a872d2c9fc37d898ecda92f9b

  • SHA512

    8b1e137a83ce90c1ed52274601d0e459db094956051ee614eee91d5496128905f3cd1c28502156f1fac6458e927c18afdb8b588156e9860b5875d84fbae7d3f0

  • SSDEEP

    49152:KaSofyDCWWqJXBhgmvQojZ2toFPVmyN8yrOR23P2yYI1C7B5lcdtH9jR9W/KMZK/:LuCEBhzQoMtoFPVmyN8yrOR23O8077l6

Malware Config

Targets

    • Target

      2024-12-17_44cbedae3850a308fb960fa71f1fb12f_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      44cbedae3850a308fb960fa71f1fb12f

    • SHA1

      3363367a8b6b9e8e4a9934c56045c8b136cd20af

    • SHA256

      eeda62c0b33b1c3fcdb4f7970300bc5f30dcc07a872d2c9fc37d898ecda92f9b

    • SHA512

      8b1e137a83ce90c1ed52274601d0e459db094956051ee614eee91d5496128905f3cd1c28502156f1fac6458e927c18afdb8b588156e9860b5875d84fbae7d3f0

    • SSDEEP

      49152:KaSofyDCWWqJXBhgmvQojZ2toFPVmyN8yrOR23P2yYI1C7B5lcdtH9jR9W/KMZK/:LuCEBhzQoMtoFPVmyN8yrOR23O8077l6

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks