General

  • Target

    2024-12-24_6af3519082ecb095698fcfbde1267cf5_floxif_mafia

  • Size

    1.9MB

  • Sample

    241224-pj7dpsxkgz

  • MD5

    6af3519082ecb095698fcfbde1267cf5

  • SHA1

    a50ee83510933a2ae1406c5f0c288b145191fb70

  • SHA256

    323587a184091e7923b1e674bf8d79196c0616d37d4556ed6b263889be9e287c

  • SHA512

    d84a9ae8d5f9d86120923d08e17e550378503579944a4f51e09bea57c73b625175031a20bc7312ecbed8987529f2dbb008ab1b236714154d1ccb70c76ebf240c

  • SSDEEP

    49152:OeLjveDGVx+KJtOw8RG48p85PCzcs7dGyayEFD54LD9RJ4KvJFBVAX69FPfr:rLeGOKTOw898O56zcs7dGyayEALD9Hvl

Malware Config

Targets

    • Target

      2024-12-24_6af3519082ecb095698fcfbde1267cf5_floxif_mafia

    • Size

      1.9MB

    • MD5

      6af3519082ecb095698fcfbde1267cf5

    • SHA1

      a50ee83510933a2ae1406c5f0c288b145191fb70

    • SHA256

      323587a184091e7923b1e674bf8d79196c0616d37d4556ed6b263889be9e287c

    • SHA512

      d84a9ae8d5f9d86120923d08e17e550378503579944a4f51e09bea57c73b625175031a20bc7312ecbed8987529f2dbb008ab1b236714154d1ccb70c76ebf240c

    • SSDEEP

      49152:OeLjveDGVx+KJtOw8RG48p85PCzcs7dGyayEFD54LD9RJ4KvJFBVAX69FPfr:rLeGOKTOw898O56zcs7dGyayEALD9Hvl

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks