General

  • Target

    2024-12-30_00af9c1dd43b6c2c70be8cdd106562a3_floxif_mafia

  • Size

    512KB

  • Sample

    241230-w2ke8avqcw

  • MD5

    00af9c1dd43b6c2c70be8cdd106562a3

  • SHA1

    7fe5024c0258b3898c352afd20a7e3a9108343a1

  • SHA256

    362ec3a2ee30d20092b3113fbdaf9fc84b787d6970c77f0fcdd59fff8ad6dd97

  • SHA512

    95caa4146bcbcb062afed25253dd78d41709e4c50fca13c9a7996c10adc1fb2c3a2a0f4cfee7b8e1a2eeb3c489d82771480f1cdb36f760c299f1008c0506f1d1

  • SSDEEP

    12288:HKqMmoNiZiJrAkg+eecJPE6nPMzBS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrk:HKqMmodg+eLxE6nP4BeVS2GhK1VqeIAu

Malware Config

Targets

    • Target

      2024-12-30_00af9c1dd43b6c2c70be8cdd106562a3_floxif_mafia

    • Size

      512KB

    • MD5

      00af9c1dd43b6c2c70be8cdd106562a3

    • SHA1

      7fe5024c0258b3898c352afd20a7e3a9108343a1

    • SHA256

      362ec3a2ee30d20092b3113fbdaf9fc84b787d6970c77f0fcdd59fff8ad6dd97

    • SHA512

      95caa4146bcbcb062afed25253dd78d41709e4c50fca13c9a7996c10adc1fb2c3a2a0f4cfee7b8e1a2eeb3c489d82771480f1cdb36f760c299f1008c0506f1d1

    • SSDEEP

      12288:HKqMmoNiZiJrAkg+eecJPE6nPMzBS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrk:HKqMmodg+eLxE6nP4BeVS2GhK1VqeIAu

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks