General

  • Target

    2024-12-23_6795e98345c077f24be4fdbc20989468_floxif_icedid

  • Size

    4.5MB

  • Sample

    241223-v3728swmbq

  • MD5

    6795e98345c077f24be4fdbc20989468

  • SHA1

    2b59ac75db0ec6646268aab14e6b5f21c1a05af4

  • SHA256

    39905a4ca2fd49775b50c224281c9527a4680a0aaecde2771daa65cf9731f217

  • SHA512

    2aa384d303ec1b00139bf964bdf53f9853364b9c7fc1f069ca14e9a1442c78a8909ef782ccbc256c8752e31c44eb9a24bef95f12144c7565096d35052ffe1b98

  • SSDEEP

    49152:TiggVlbw6UtdwuAqdeD6x7EOTrODhJf85pdY9CNwuAqdeD6x7EOTrODhJf/RiVuM:ToVlbwHtdvAcl5pdvNvAcoRiMAz

Malware Config

Targets

    • Target

      2024-12-23_6795e98345c077f24be4fdbc20989468_floxif_icedid

    • Size

      4.5MB

    • MD5

      6795e98345c077f24be4fdbc20989468

    • SHA1

      2b59ac75db0ec6646268aab14e6b5f21c1a05af4

    • SHA256

      39905a4ca2fd49775b50c224281c9527a4680a0aaecde2771daa65cf9731f217

    • SHA512

      2aa384d303ec1b00139bf964bdf53f9853364b9c7fc1f069ca14e9a1442c78a8909ef782ccbc256c8752e31c44eb9a24bef95f12144c7565096d35052ffe1b98

    • SSDEEP

      49152:TiggVlbw6UtdwuAqdeD6x7EOTrODhJf85pdY9CNwuAqdeD6x7EOTrODhJf/RiVuM:ToVlbwHtdvAcl5pdvNvAcoRiMAz

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks