General

  • Target

    2024-12-17_da914e2f8105ec2903ed435d729cfdd8_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    241217-pwjs6szjc1

  • MD5

    da914e2f8105ec2903ed435d729cfdd8

  • SHA1

    83ef82af015e198666b5c6d3d62c869206fdb012

  • SHA256

    88d9ab1fb085740fab1c836bd8348ec1034f4ffde2f5275180f80b690d09e894

  • SHA512

    67077881dd49650425c567bca7ea3f34724dad31f83feac8c551d8539b96d2043b9c09719d0c7ec6af47996e9f1ea6ffb8c00fcd0dd151ae6cba7bef84f5acd4

  • SSDEEP

    49152:KIGYB+v+ta6viBRbJXA+Tatqc5doCUW5SwFAvhDzaDrhFmA3RcnZPCCGiPxe7W/C:K6TKB/DKqc5doCUW5jFAvBODXRAZPCCW

Malware Config

Targets

    • Target

      2024-12-17_da914e2f8105ec2903ed435d729cfdd8_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      da914e2f8105ec2903ed435d729cfdd8

    • SHA1

      83ef82af015e198666b5c6d3d62c869206fdb012

    • SHA256

      88d9ab1fb085740fab1c836bd8348ec1034f4ffde2f5275180f80b690d09e894

    • SHA512

      67077881dd49650425c567bca7ea3f34724dad31f83feac8c551d8539b96d2043b9c09719d0c7ec6af47996e9f1ea6ffb8c00fcd0dd151ae6cba7bef84f5acd4

    • SSDEEP

      49152:KIGYB+v+ta6viBRbJXA+Tatqc5doCUW5SwFAvhDzaDrhFmA3RcnZPCCGiPxe7W/C:K6TKB/DKqc5doCUW5jFAvBODXRAZPCCW

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks