General

  • Target

    2025-01-24_c879c98cf97fa28f21de40c0029d313f_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    250124-szev6swrcp

  • MD5

    c879c98cf97fa28f21de40c0029d313f

  • SHA1

    5c3ebc13f77ca288f602941c51e2b808d0b31667

  • SHA256

    1eec1bd0be77b382b89bf50e21e951f37cf62827011d0131a9525ee7e334c761

  • SHA512

    c65c15a84f7fc0f313d67ae7c30e6ab4e3e7a607fda14a7f806d7ec70d495b8ae3ca0c4b13ded423d5958e668dfba5b77dee09b96d6fc2b57b8f4fcf0dd8d0c6

  • SSDEEP

    49152:2Pf6VdMQTNRbg23khkNw//7vgseqziRS1UsrzoeNFZeV5c71y9Bx4M3W/KMZKWK9:2q1Rz3ksw//7vgVqziRS1Usrzppe5y1U

Malware Config

Targets

    • Target

      2025-01-24_c879c98cf97fa28f21de40c0029d313f_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      c879c98cf97fa28f21de40c0029d313f

    • SHA1

      5c3ebc13f77ca288f602941c51e2b808d0b31667

    • SHA256

      1eec1bd0be77b382b89bf50e21e951f37cf62827011d0131a9525ee7e334c761

    • SHA512

      c65c15a84f7fc0f313d67ae7c30e6ab4e3e7a607fda14a7f806d7ec70d495b8ae3ca0c4b13ded423d5958e668dfba5b77dee09b96d6fc2b57b8f4fcf0dd8d0c6

    • SSDEEP

      49152:2Pf6VdMQTNRbg23khkNw//7vgseqziRS1UsrzoeNFZeV5c71y9Bx4M3W/KMZKWK9:2q1Rz3ksw//7vgVqziRS1Usrzppe5y1U

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks