General

  • Target

    2024-12-30_fc0e458ae17a1c166f6977c826fa6b61_floxif_mafia

  • Size

    2.4MB

  • Sample

    241230-axvvha1rf1

  • MD5

    fc0e458ae17a1c166f6977c826fa6b61

  • SHA1

    6fcb753e8b70f90049a7bad26da23e52a130298e

  • SHA256

    ae02b2d74f552236bab953c4f0c8207effb682add53ce10681f5ed8999fa260e

  • SHA512

    a1efadc6b939b32c85e03d03d625ca8edd579ee3bf3485cd485df8c18605ed1c5abbfc8771de50e197ff15d5c0011d64f7a1e894e895a19726415a2c1d3b0e40

  • SSDEEP

    49152:1uE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qU:ME7AfrlyutLxC3sEwwM3UU

Malware Config

Targets

    • Target

      2024-12-30_fc0e458ae17a1c166f6977c826fa6b61_floxif_mafia

    • Size

      2.4MB

    • MD5

      fc0e458ae17a1c166f6977c826fa6b61

    • SHA1

      6fcb753e8b70f90049a7bad26da23e52a130298e

    • SHA256

      ae02b2d74f552236bab953c4f0c8207effb682add53ce10681f5ed8999fa260e

    • SHA512

      a1efadc6b939b32c85e03d03d625ca8edd579ee3bf3485cd485df8c18605ed1c5abbfc8771de50e197ff15d5c0011d64f7a1e894e895a19726415a2c1d3b0e40

    • SSDEEP

      49152:1uE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qU:ME7AfrlyutLxC3sEwwM3UU

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks