General

  • Target

    2025-01-11_7f302593e46ff449ba536e54ec06a7a3_floxif_icedid

  • Size

    3.9MB

  • Sample

    250111-g7cv1aymav

  • MD5

    7f302593e46ff449ba536e54ec06a7a3

  • SHA1

    5850c31c929da780280b96ba81b0405a533ec62a

  • SHA256

    dd7042f36e5d80a42eefa23db118ccf5a53c3f87f6243f0a5ccfd5a9c14da37b

  • SHA512

    0d6a0701874c3d000023110e156bf8faf2a868406cdd47773746dc2a9404aab2a4948452c95689429f053d55f47de78b999a72e1c18e3e6bb2b361263215bbce

  • SSDEEP

    49152:JZLWrnsjYnhuLoeX4MpRPd1mRkBOWZPiywAy1/c8aL:JZ9+PeX4Mp71mRkhZPU3k8aL

Malware Config

Targets

    • Target

      2025-01-11_7f302593e46ff449ba536e54ec06a7a3_floxif_icedid

    • Size

      3.9MB

    • MD5

      7f302593e46ff449ba536e54ec06a7a3

    • SHA1

      5850c31c929da780280b96ba81b0405a533ec62a

    • SHA256

      dd7042f36e5d80a42eefa23db118ccf5a53c3f87f6243f0a5ccfd5a9c14da37b

    • SHA512

      0d6a0701874c3d000023110e156bf8faf2a868406cdd47773746dc2a9404aab2a4948452c95689429f053d55f47de78b999a72e1c18e3e6bb2b361263215bbce

    • SSDEEP

      49152:JZLWrnsjYnhuLoeX4MpRPd1mRkBOWZPiywAy1/c8aL:JZ9+PeX4Mp71mRkhZPU3k8aL

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks