General

  • Target

    2024-12-24_14d39445782a60775819554fa596cdde_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    241224-pnd8qaxngr

  • MD5

    14d39445782a60775819554fa596cdde

  • SHA1

    5c6887934afec72617209ca14a2855f3faa9cec4

  • SHA256

    57e2800fbad2b2f36561a72b4feebf25e67897309afb459242434c7c653c0f0a

  • SHA512

    9af4db0590ff28efcf62302d03a3ad0b99090e26e35470e5da2ce34259157b3153390e897b5ce4c9708614e7c8aa436bb1d7de41a4a8a2d17fba0e563c28106f

  • SSDEEP

    49152:KIGYB+v+ta6viBRbJXQv+Tatqc5djUW5SwFAvhDzaDrhFmASRcnZPCCGiPxe7W/b:K6TKB/AGKqc5djUW5jFAvBODyRAZPCCX

Malware Config

Targets

    • Target

      2024-12-24_14d39445782a60775819554fa596cdde_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      14d39445782a60775819554fa596cdde

    • SHA1

      5c6887934afec72617209ca14a2855f3faa9cec4

    • SHA256

      57e2800fbad2b2f36561a72b4feebf25e67897309afb459242434c7c653c0f0a

    • SHA512

      9af4db0590ff28efcf62302d03a3ad0b99090e26e35470e5da2ce34259157b3153390e897b5ce4c9708614e7c8aa436bb1d7de41a4a8a2d17fba0e563c28106f

    • SSDEEP

      49152:KIGYB+v+ta6viBRbJXQv+Tatqc5djUW5SwFAvhDzaDrhFmASRcnZPCCGiPxe7W/b:K6TKB/AGKqc5djUW5jFAvBODyRAZPCCX

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks