General

  • Target

    2024-12-30_d8e3d64443c8c88e11a35b644a5b33b0_floxif_mafia_retefe

  • Size

    21.9MB

  • Sample

    241230-pq1jqsyjcy

  • MD5

    d8e3d64443c8c88e11a35b644a5b33b0

  • SHA1

    c898f893411fbdecd8f471b2f2eb15a6b73e94a8

  • SHA256

    d1b6c1ac48b9f2d48dfbcd40db1ab12c3feba2d761db95be8c6601180b49ae4a

  • SHA512

    05a25b9532b698c5db920cea61a29782dfef5c0f0135e5a330989a68dd4aa5e8d4453bc5fc894f49eae69651b28a00379d02607f4b2ff80f855691d01434b425

  • SSDEEP

    98304:UsR9Np1R95JdhV5N1HLYU1MDpLBn7Wr/DXl/Tnp9OyZJPrHEbhZhuUV7h4q6GiOl:U5slFW5N8g2H7PX2EE8REy3n2

Malware Config

Targets

    • Target

      2024-12-30_d8e3d64443c8c88e11a35b644a5b33b0_floxif_mafia_retefe

    • Size

      21.9MB

    • MD5

      d8e3d64443c8c88e11a35b644a5b33b0

    • SHA1

      c898f893411fbdecd8f471b2f2eb15a6b73e94a8

    • SHA256

      d1b6c1ac48b9f2d48dfbcd40db1ab12c3feba2d761db95be8c6601180b49ae4a

    • SHA512

      05a25b9532b698c5db920cea61a29782dfef5c0f0135e5a330989a68dd4aa5e8d4453bc5fc894f49eae69651b28a00379d02607f4b2ff80f855691d01434b425

    • SSDEEP

      98304:UsR9Np1R95JdhV5N1HLYU1MDpLBn7Wr/DXl/Tnp9OyZJPrHEbhZhuUV7h4q6GiOl:U5slFW5N8g2H7PX2EE8REy3n2

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks