General

  • Target

    2025-01-01_3d69e515c45ca6d7781b5d93c6a58d99_floxif_mafia

  • Size

    2.4MB

  • Sample

    250101-w9y9cazpdk

  • MD5

    3d69e515c45ca6d7781b5d93c6a58d99

  • SHA1

    f785f2e2cb12c7308a00c78aee2b2596914d3775

  • SHA256

    63ea71527db214a09b73eedf35021c0dabe44d7fb25cbee962d0c36886d8a09f

  • SHA512

    8a77cbb6bccfab514ce861a8ab5c59c752af071ab063d00cde160d9812fd7e3682d9af5cb5c2457d9bc847da7ca8f3ea5a2d5b37457d1ba8dd1bf144df7efb2d

  • SSDEEP

    49152:touE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qE:lE7AfrlyutLxC3sEwwM3UE

Malware Config

Targets

    • Target

      2025-01-01_3d69e515c45ca6d7781b5d93c6a58d99_floxif_mafia

    • Size

      2.4MB

    • MD5

      3d69e515c45ca6d7781b5d93c6a58d99

    • SHA1

      f785f2e2cb12c7308a00c78aee2b2596914d3775

    • SHA256

      63ea71527db214a09b73eedf35021c0dabe44d7fb25cbee962d0c36886d8a09f

    • SHA512

      8a77cbb6bccfab514ce861a8ab5c59c752af071ab063d00cde160d9812fd7e3682d9af5cb5c2457d9bc847da7ca8f3ea5a2d5b37457d1ba8dd1bf144df7efb2d

    • SSDEEP

      49152:touE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qE:lE7AfrlyutLxC3sEwwM3UE

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks