General

  • Target

    2024-12-18_e0a7697149037e7fb7db590508ae0465_floxif_mafia

  • Size

    239KB

  • Sample

    241218-w2ppyaykdl

  • MD5

    e0a7697149037e7fb7db590508ae0465

  • SHA1

    bbd8856a5a7a9efc471775194f9c6c1a189091c2

  • SHA256

    92c1c7bf7843e30011df5202ac31d518b67849439b90f53c533f2c737a3f2ea3

  • SHA512

    9d614116297aeb928d989ad382205331fcb02e7e09d9d49e12aa2943c2c96739db0a569b193cf3d09d509f2717f7c90c08863aa780f57ec621387135bd071381

  • SSDEEP

    6144:OXDN4pdDMjfSZlNn/IcpGnzfBV+UdvrEFp7hKUi:OXwdDMj6nNn/ppOzfBjvrEH7xi

Malware Config

Targets

    • Target

      2024-12-18_e0a7697149037e7fb7db590508ae0465_floxif_mafia

    • Size

      239KB

    • MD5

      e0a7697149037e7fb7db590508ae0465

    • SHA1

      bbd8856a5a7a9efc471775194f9c6c1a189091c2

    • SHA256

      92c1c7bf7843e30011df5202ac31d518b67849439b90f53c533f2c737a3f2ea3

    • SHA512

      9d614116297aeb928d989ad382205331fcb02e7e09d9d49e12aa2943c2c96739db0a569b193cf3d09d509f2717f7c90c08863aa780f57ec621387135bd071381

    • SSDEEP

      6144:OXDN4pdDMjfSZlNn/IcpGnzfBV+UdvrEFp7hKUi:OXwdDMj6nNn/ppOzfBjvrEH7xi

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks