General

  • Target

    2024-12-30_8fa30b22e8b70543b4e8bc596129f1f2_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    241230-pn8gkavqal

  • MD5

    8fa30b22e8b70543b4e8bc596129f1f2

  • SHA1

    a5d8d5a231922f3a731095452b26f724337344df

  • SHA256

    4e54a62c636e7c4a719ef66e922301b3562d4e9825850aa19c49eb897b3f88f1

  • SHA512

    257e501e77274d97431fd587b32df00231218c37f7508c349ff4dedd7966aec556c5de1bcc6830b6efbc0649d337b1dd56fbf2b14f15a010751764860227e5f6

  • SSDEEP

    49152:2Pf6VdnQTNRbg23shkNw//7vgseqziRS1UsrzoeNFZeu5c71y9Bx4M3W/KMZKWKx:2q2Rz3ssw//7vgVqziRS1Usrzppp5y1I

Malware Config

Targets

    • Target

      2024-12-30_8fa30b22e8b70543b4e8bc596129f1f2_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      8fa30b22e8b70543b4e8bc596129f1f2

    • SHA1

      a5d8d5a231922f3a731095452b26f724337344df

    • SHA256

      4e54a62c636e7c4a719ef66e922301b3562d4e9825850aa19c49eb897b3f88f1

    • SHA512

      257e501e77274d97431fd587b32df00231218c37f7508c349ff4dedd7966aec556c5de1bcc6830b6efbc0649d337b1dd56fbf2b14f15a010751764860227e5f6

    • SSDEEP

      49152:2Pf6VdnQTNRbg23shkNw//7vgseqziRS1UsrzoeNFZeu5c71y9Bx4M3W/KMZKWKx:2q2Rz3ssw//7vgVqziRS1Usrzppp5y1I

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks