General

  • Target

    2024-12-19_fdebc58f5418e2ec6f09ce2c3fc86cf7_floxif_mafia

  • Size

    2.4MB

  • Sample

    241219-awl6zazlfj

  • MD5

    fdebc58f5418e2ec6f09ce2c3fc86cf7

  • SHA1

    133a4b4ffe7b64d9d11dc63ed3501f621ef77bfd

  • SHA256

    53fac4423d79bfbcb237a197f2dead78338ff475ec33c7e1c6912a52bf9bc58e

  • SHA512

    34b345b39af4f1bc6fcfe4701cfb188171c078fd28282004c4567c318b223506e600da493d8b65517257f1252cd57fe0853444471c788340840c7f37ae204d6c

  • SSDEEP

    49152:VQuE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qPD:5E7AfrlyutLxC3sEwwM3UPD

Malware Config

Targets

    • Target

      2024-12-19_fdebc58f5418e2ec6f09ce2c3fc86cf7_floxif_mafia

    • Size

      2.4MB

    • MD5

      fdebc58f5418e2ec6f09ce2c3fc86cf7

    • SHA1

      133a4b4ffe7b64d9d11dc63ed3501f621ef77bfd

    • SHA256

      53fac4423d79bfbcb237a197f2dead78338ff475ec33c7e1c6912a52bf9bc58e

    • SHA512

      34b345b39af4f1bc6fcfe4701cfb188171c078fd28282004c4567c318b223506e600da493d8b65517257f1252cd57fe0853444471c788340840c7f37ae204d6c

    • SSDEEP

      49152:VQuE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qPD:5E7AfrlyutLxC3sEwwM3UPD

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks