General

  • Target

    2025-01-10_892a47d316f41df59a6c67160059c717_floxif_mafia

  • Size

    266KB

  • Sample

    250110-wpzz5s1pet

  • MD5

    892a47d316f41df59a6c67160059c717

  • SHA1

    cdbe22e3a768a5f33682cc68c3c3d8d16cd511b5

  • SHA256

    29ef0c69ea50c29b9068f7d9e5556ee498a4480d53787de910db805fc1d7a333

  • SHA512

    2016509329833c1ae7f0b780b29baa72d7d6574c9e5c1f0f248bc64b82126afffb56cc852e4df6f61bbd15e675da718da51344aa97766f83925d1e54eaa41d89

  • SSDEEP

    6144:cl7shBongzc8rNJR83BKp2pv2BV+UdvrEFp7hKncR:jBont8rNJR8RKpgv2BjvrEH7K+

Malware Config

Targets

    • Target

      2025-01-10_892a47d316f41df59a6c67160059c717_floxif_mafia

    • Size

      266KB

    • MD5

      892a47d316f41df59a6c67160059c717

    • SHA1

      cdbe22e3a768a5f33682cc68c3c3d8d16cd511b5

    • SHA256

      29ef0c69ea50c29b9068f7d9e5556ee498a4480d53787de910db805fc1d7a333

    • SHA512

      2016509329833c1ae7f0b780b29baa72d7d6574c9e5c1f0f248bc64b82126afffb56cc852e4df6f61bbd15e675da718da51344aa97766f83925d1e54eaa41d89

    • SSDEEP

      6144:cl7shBongzc8rNJR83BKp2pv2BV+UdvrEFp7hKncR:jBont8rNJR8RKpgv2BjvrEH7K+

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks