General

  • Target

    2024-12-22_9f43ce8b559e3c24d3ffe486771920c4_floxif_icedid

  • Size

    257KB

  • Sample

    241222-w3pfkavndx

  • MD5

    9f43ce8b559e3c24d3ffe486771920c4

  • SHA1

    2b6cb6f5c6541d0c656173a6300cd98468bf7eb2

  • SHA256

    524ddf5ec722d733fa91f23b42c1baf36d1ee491545b3e9ee3cc4b8df2ecc722

  • SHA512

    c51457fa43ab48dde4bff209b697ef0fe9cf0ca37418aef5ecaadfdc6a29c0c8631bb115c5c87245a9cd4f8210ff00333ac33c52db1242c4bf0d5d2814f8ed6b

  • SSDEEP

    6144:B7W8WAtiTDOPV+8txrtPyBV+UdvrEFp7hKB4:B7kAtiTCxtx0BjvrEH764

Malware Config

Targets

    • Target

      2024-12-22_9f43ce8b559e3c24d3ffe486771920c4_floxif_icedid

    • Size

      257KB

    • MD5

      9f43ce8b559e3c24d3ffe486771920c4

    • SHA1

      2b6cb6f5c6541d0c656173a6300cd98468bf7eb2

    • SHA256

      524ddf5ec722d733fa91f23b42c1baf36d1ee491545b3e9ee3cc4b8df2ecc722

    • SHA512

      c51457fa43ab48dde4bff209b697ef0fe9cf0ca37418aef5ecaadfdc6a29c0c8631bb115c5c87245a9cd4f8210ff00333ac33c52db1242c4bf0d5d2814f8ed6b

    • SSDEEP

      6144:B7W8WAtiTDOPV+8txrtPyBV+UdvrEFp7hKB4:B7kAtiTCxtx0BjvrEH764

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks