General

  • Target

    2024-12-25_037c037c3066ced125fbade83fafd9ee_floxif_mafia

  • Size

    2.4MB

  • Sample

    241225-w1rsxa1rd1

  • MD5

    037c037c3066ced125fbade83fafd9ee

  • SHA1

    b503748b76ff4bd26dbb10109df3af0392beddca

  • SHA256

    b7444b7a31e1f44784af8cff4466a4d3c0ae10a044bfe0252bc32d33a4258137

  • SHA512

    12f0190683f144f1fa9808f84b4b8b8d4d4b74b61268f50cbdf9e6ff2c557c40a55d883978555aa9bf892f2c5fe3f7f7a0ab92339b3da02901dba042cc1fd336

  • SSDEEP

    49152:23uRkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qA:zRfrlyutLxC3sEwwM3UA

Malware Config

Targets

    • Target

      2024-12-25_037c037c3066ced125fbade83fafd9ee_floxif_mafia

    • Size

      2.4MB

    • MD5

      037c037c3066ced125fbade83fafd9ee

    • SHA1

      b503748b76ff4bd26dbb10109df3af0392beddca

    • SHA256

      b7444b7a31e1f44784af8cff4466a4d3c0ae10a044bfe0252bc32d33a4258137

    • SHA512

      12f0190683f144f1fa9808f84b4b8b8d4d4b74b61268f50cbdf9e6ff2c557c40a55d883978555aa9bf892f2c5fe3f7f7a0ab92339b3da02901dba042cc1fd336

    • SSDEEP

      49152:23uRkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qA:zRfrlyutLxC3sEwwM3UA

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks