General

  • Target

    2025-01-05_7483be8126da1f9f54081abba7dcd347_floxif_mafia

  • Size

    3.9MB

  • Sample

    250105-rvmjsaypej

  • MD5

    7483be8126da1f9f54081abba7dcd347

  • SHA1

    59a9a3d1709e7f8ac687009fcc7780fde8d1afba

  • SHA256

    21678d3085c6d812e2fc7dcda91695850726fa40c66fe8ef3e6a59ca44ca18f9

  • SHA512

    ab30cf4d04ca91b5a0bf9783dccd2837595fb3c88cea9190e143ddb78b337e142472d5cfb236f429e5ba2fec4bdf50d9b46203b904d7cbfd1b833d0249829a2b

  • SSDEEP

    98304:1g+ESjo/Z6DRwcEtzCyQWuKglLgOQ/Pn9rj+De0nzQUy3:1g+ESq6bOuTghn9rj+DoU0

Malware Config

Targets

    • Target

      2025-01-05_7483be8126da1f9f54081abba7dcd347_floxif_mafia

    • Size

      3.9MB

    • MD5

      7483be8126da1f9f54081abba7dcd347

    • SHA1

      59a9a3d1709e7f8ac687009fcc7780fde8d1afba

    • SHA256

      21678d3085c6d812e2fc7dcda91695850726fa40c66fe8ef3e6a59ca44ca18f9

    • SHA512

      ab30cf4d04ca91b5a0bf9783dccd2837595fb3c88cea9190e143ddb78b337e142472d5cfb236f429e5ba2fec4bdf50d9b46203b904d7cbfd1b833d0249829a2b

    • SSDEEP

      98304:1g+ESjo/Z6DRwcEtzCyQWuKglLgOQ/Pn9rj+De0nzQUy3:1g+ESq6bOuTghn9rj+DoU0

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks