General

  • Target

    2024-12-24_672c83dc8d86b7f14370e0e820cb1bd7_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    241224-pj2hfsxkgv

  • MD5

    672c83dc8d86b7f14370e0e820cb1bd7

  • SHA1

    95a8ac29a9f13e2361e8a4fa8c68b3f0439c2107

  • SHA256

    82b7d97368e23848441a92df20a0941a0e1cf88ee888813db760f0fd564fc98d

  • SHA512

    36b06bd15b870c8dde6e5961e39658acf98d2a057bdb69cf80e0467f0092ec8dff6871bafae0d2869c30df135238e3147d9cc2d968a738f5e1b7c60d62e49648

  • SSDEEP

    49152:2Pf6VdMQTNRbg23shkNw//7vgseqziEsrzoeNFZe55c71y9Bx4M3W/KMZKWKKFTP:2q1Rz3ssw//7vgVqziEsrzppy5y1y9BS

Malware Config

Targets

    • Target

      2024-12-24_672c83dc8d86b7f14370e0e820cb1bd7_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      672c83dc8d86b7f14370e0e820cb1bd7

    • SHA1

      95a8ac29a9f13e2361e8a4fa8c68b3f0439c2107

    • SHA256

      82b7d97368e23848441a92df20a0941a0e1cf88ee888813db760f0fd564fc98d

    • SHA512

      36b06bd15b870c8dde6e5961e39658acf98d2a057bdb69cf80e0467f0092ec8dff6871bafae0d2869c30df135238e3147d9cc2d968a738f5e1b7c60d62e49648

    • SSDEEP

      49152:2Pf6VdMQTNRbg23shkNw//7vgseqziEsrzoeNFZe55c71y9Bx4M3W/KMZKWKKFTP:2q1Rz3ssw//7vgVqziEsrzppy5y1y9BS

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks