General

  • Target

    2024-12-19_b9dcac482001af3283ba7a60a674a7fe_floxif_hijackloader_mafia

  • Size

    562KB

  • Sample

    241219-jav2esvrfj

  • MD5

    b9dcac482001af3283ba7a60a674a7fe

  • SHA1

    d618f8b3734e659d54e8b6ee52e1c049e38872cb

  • SHA256

    bf86eb95c3fb02c25298f74dcf63afb3b14190e515685ea493e52e34c446cace

  • SHA512

    7b46a74db043cd7d400edc422c2f4825e9190817bbecdcdf3e6d724eafd269bd83b2cfa6a37ad9e45f1087c1cdfe1265e228518931af1ce7e74a3a02e3bef4d4

  • SSDEEP

    12288:QnR+T6jdSeBjH7wkMGm4suSlvdGIBjvrEH70:QnR+T6BSeB7+4tivd3rEH70

Malware Config

Targets

    • Target

      2024-12-19_b9dcac482001af3283ba7a60a674a7fe_floxif_hijackloader_mafia

    • Size

      562KB

    • MD5

      b9dcac482001af3283ba7a60a674a7fe

    • SHA1

      d618f8b3734e659d54e8b6ee52e1c049e38872cb

    • SHA256

      bf86eb95c3fb02c25298f74dcf63afb3b14190e515685ea493e52e34c446cace

    • SHA512

      7b46a74db043cd7d400edc422c2f4825e9190817bbecdcdf3e6d724eafd269bd83b2cfa6a37ad9e45f1087c1cdfe1265e228518931af1ce7e74a3a02e3bef4d4

    • SSDEEP

      12288:QnR+T6jdSeBjH7wkMGm4suSlvdGIBjvrEH70:QnR+T6BSeB7+4tivd3rEH70

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks