General

  • Target

    2025-01-02_156af6d0ef95685f42d016449e50676f_floxif_icedid

  • Size

    480KB

  • Sample

    250102-x31n9ssmdv

  • MD5

    156af6d0ef95685f42d016449e50676f

  • SHA1

    4234d76c9cd03d8c0d60f91edceb9d0c8989e357

  • SHA256

    b1510ba57e8e1c2c1cce3755679d35835bd839e8f8f5c774fc41978de46d7f65

  • SHA512

    ff3e1cc73fea72f250ba7ab5a84d78f2124c89f5d11bda5622dacb279b0fe63382ac3cff74147eba87e5d346cd338510edb7ea0c4bbb214b6820513cab8ca428

  • SSDEEP

    12288:lgEBbMtGUWYmeJJsSW6Q2fQTqeaU1Yh1NVZqbRgPBjvrEH7/:y4MYUWY/sRUrEH7/

Malware Config

Targets

    • Target

      2025-01-02_156af6d0ef95685f42d016449e50676f_floxif_icedid

    • Size

      480KB

    • MD5

      156af6d0ef95685f42d016449e50676f

    • SHA1

      4234d76c9cd03d8c0d60f91edceb9d0c8989e357

    • SHA256

      b1510ba57e8e1c2c1cce3755679d35835bd839e8f8f5c774fc41978de46d7f65

    • SHA512

      ff3e1cc73fea72f250ba7ab5a84d78f2124c89f5d11bda5622dacb279b0fe63382ac3cff74147eba87e5d346cd338510edb7ea0c4bbb214b6820513cab8ca428

    • SSDEEP

      12288:lgEBbMtGUWYmeJJsSW6Q2fQTqeaU1Yh1NVZqbRgPBjvrEH7/:y4MYUWY/sRUrEH7/

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks