General

  • Target

    2024-12-19_636cc83501292a7a5d746b35494171a5_floxif_hijackloader_icedid

  • Size

    3.2MB

  • Sample

    241219-v271vawqdv

  • MD5

    636cc83501292a7a5d746b35494171a5

  • SHA1

    460cbbc5b21a8c9ec851c7d63875bf0b433d99ca

  • SHA256

    c216a6bd9bddbda47976ac8f2591d6d85a4b84e8a3f19d7eff774adba38f7525

  • SHA512

    1b23af415e0759f0bb718fe2be9293f4c5b2e244c0131fe3132c2f6b03281b311b62e7b76cc0daecee458a975d5f3a2536473bfb4212207936a6f800de6d7732

  • SSDEEP

    49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXobnbtfNPBtpCW1zMm:2KMHXADyPSWMNXobPBtMW2m

Malware Config

Targets

    • Target

      2024-12-19_636cc83501292a7a5d746b35494171a5_floxif_hijackloader_icedid

    • Size

      3.2MB

    • MD5

      636cc83501292a7a5d746b35494171a5

    • SHA1

      460cbbc5b21a8c9ec851c7d63875bf0b433d99ca

    • SHA256

      c216a6bd9bddbda47976ac8f2591d6d85a4b84e8a3f19d7eff774adba38f7525

    • SHA512

      1b23af415e0759f0bb718fe2be9293f4c5b2e244c0131fe3132c2f6b03281b311b62e7b76cc0daecee458a975d5f3a2536473bfb4212207936a6f800de6d7732

    • SSDEEP

      49152:2KT5razB15YsBNMqxs9j7GvQDf536Ubmezbj2PSWMNXobnbtfNPBtpCW1zMm:2KMHXADyPSWMNXobPBtMW2m

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks