General

  • Target

    2024-12-31_e1ff4880c402b6dc192c8b993ebb0db8_floxif_mafia

  • Size

    512KB

  • Sample

    241231-gafwdszpds

  • MD5

    e1ff4880c402b6dc192c8b993ebb0db8

  • SHA1

    5caa573b29bf620d258fbfc2e5d0419a326f55e8

  • SHA256

    5b52b4899ab31c833ae18dbca5d0b09cb12a057c2ab04eb69ada3add865b73d9

  • SHA512

    d34a9f39fab7d59c10680842b663fc8ccce73b57d5d1b8886c5593c5505066a6a5fe0ebca20bdf5d23681dcc1c20d0a6bae6af67e5ab6f4658af28b95cca290d

  • SSDEEP

    12288:HKqMmoNiZiJrAkg+eecZE6nPMz0zS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrs:HKqMmodg+eLZE6nP4ieVS2GhK1VqeIAC

Malware Config

Targets

    • Target

      2024-12-31_e1ff4880c402b6dc192c8b993ebb0db8_floxif_mafia

    • Size

      512KB

    • MD5

      e1ff4880c402b6dc192c8b993ebb0db8

    • SHA1

      5caa573b29bf620d258fbfc2e5d0419a326f55e8

    • SHA256

      5b52b4899ab31c833ae18dbca5d0b09cb12a057c2ab04eb69ada3add865b73d9

    • SHA512

      d34a9f39fab7d59c10680842b663fc8ccce73b57d5d1b8886c5593c5505066a6a5fe0ebca20bdf5d23681dcc1c20d0a6bae6af67e5ab6f4658af28b95cca290d

    • SSDEEP

      12288:HKqMmoNiZiJrAkg+eecZE6nPMz0zS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrs:HKqMmodg+eLZE6nP4ieVS2GhK1VqeIAC

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks