General

  • Target

    2024-12-27_f60850dcc230a3759c3b384eab484292_floxif_mafia

  • Size

    315KB

  • Sample

    241227-bd1r3sxmar

  • MD5

    f60850dcc230a3759c3b384eab484292

  • SHA1

    2b0d80b5dba2f128d37e4172d4efa14b3d478540

  • SHA256

    1d3562c2054b19e0ce4888f5b3687e99642be17ba9bac1c7e2c2d7e0545b5ca0

  • SHA512

    08730437664f367ac2c083308ad2aa70f96e3e151b95ae461875bd8d68c1c6b6caae35bf96940676310e3660fc8d29083f248f0168c7c3cb0daef89d46c2c476

  • SSDEEP

    6144:uAhw0gWrZbQS69EXKP2FoUIFL3bOYBV+UdvrEFp7hKTQj0fe:DSdWFkS6UK+oUCL3iYBjvrEH70Q02

Malware Config

Targets

    • Target

      2024-12-27_f60850dcc230a3759c3b384eab484292_floxif_mafia

    • Size

      315KB

    • MD5

      f60850dcc230a3759c3b384eab484292

    • SHA1

      2b0d80b5dba2f128d37e4172d4efa14b3d478540

    • SHA256

      1d3562c2054b19e0ce4888f5b3687e99642be17ba9bac1c7e2c2d7e0545b5ca0

    • SHA512

      08730437664f367ac2c083308ad2aa70f96e3e151b95ae461875bd8d68c1c6b6caae35bf96940676310e3660fc8d29083f248f0168c7c3cb0daef89d46c2c476

    • SSDEEP

      6144:uAhw0gWrZbQS69EXKP2FoUIFL3bOYBV+UdvrEFp7hKTQj0fe:DSdWFkS6UK+oUCL3iYBjvrEH70Q02

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks