General

  • Target

    2025-01-20_c92c32719f3593ddfb4567987513f9cb_floxif_mafia

  • Size

    2.5MB

  • Sample

    250120-ljw17aspct

  • MD5

    c92c32719f3593ddfb4567987513f9cb

  • SHA1

    a8304c0f22e1ba12ae7c3ad37393d78281634ac0

  • SHA256

    8bd256109d65c1792605b31e52174a83906cbf233388016c069ecddc7c6e90f2

  • SHA512

    4213546d34416fea1a3b18dbc3db129cf5b43fd4611b663491259d3e395ea7f41a41de54ffb43c5697e38a915c4077e6bb34b529f989c81642da46e8dbc04c32

  • SSDEEP

    49152:kuIIK9ofs2hPd2l177BTK2VbDsar1YDj8:kjEfs2hPIl1/z

Malware Config

Targets

    • Target

      2025-01-20_c92c32719f3593ddfb4567987513f9cb_floxif_mafia

    • Size

      2.5MB

    • MD5

      c92c32719f3593ddfb4567987513f9cb

    • SHA1

      a8304c0f22e1ba12ae7c3ad37393d78281634ac0

    • SHA256

      8bd256109d65c1792605b31e52174a83906cbf233388016c069ecddc7c6e90f2

    • SHA512

      4213546d34416fea1a3b18dbc3db129cf5b43fd4611b663491259d3e395ea7f41a41de54ffb43c5697e38a915c4077e6bb34b529f989c81642da46e8dbc04c32

    • SSDEEP

      49152:kuIIK9ofs2hPd2l177BTK2VbDsar1YDj8:kjEfs2hPIl1/z

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks