General

  • Target

    2024-12-25_4354123d8c23cc41c81b5c3f57300c17_floxif_mafia

  • Size

    2.4MB

  • Sample

    241225-ap9cxs1rdt

  • MD5

    4354123d8c23cc41c81b5c3f57300c17

  • SHA1

    71a631dbfebd7ac29c9eae355b1086d7d55663c6

  • SHA256

    adf8309a1747afc6cfcbec33d3bebd39d5b57123bf1708de2561c1ed141a59cc

  • SHA512

    ef362e18bd9c7ee41b9c5c4fc3ee1dcf93197c97274a1d8c71e878e867dd5d4a0bf19e66ade43e7e1cd9069a7a1caf29cb3f1105afb7142849e80a75c8044a30

  • SSDEEP

    49152:2PuE7AbqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qS:PE7A+rlyutLxC3sEwwM3US

Malware Config

Targets

    • Target

      2024-12-25_4354123d8c23cc41c81b5c3f57300c17_floxif_mafia

    • Size

      2.4MB

    • MD5

      4354123d8c23cc41c81b5c3f57300c17

    • SHA1

      71a631dbfebd7ac29c9eae355b1086d7d55663c6

    • SHA256

      adf8309a1747afc6cfcbec33d3bebd39d5b57123bf1708de2561c1ed141a59cc

    • SHA512

      ef362e18bd9c7ee41b9c5c4fc3ee1dcf93197c97274a1d8c71e878e867dd5d4a0bf19e66ade43e7e1cd9069a7a1caf29cb3f1105afb7142849e80a75c8044a30

    • SSDEEP

      49152:2PuE7AbqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qS:PE7A+rlyutLxC3sEwwM3US

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks