General

  • Target

    2025-02-05_07d4199db8c5f37629248a849d368b0e_floxif_poet-rat_snatch

  • Size

    16.2MB

  • Sample

    250205-a4yjzasman

  • MD5

    07d4199db8c5f37629248a849d368b0e

  • SHA1

    c77ac162c233f32f2f08d59c6586ac3a186a0f81

  • SHA256

    0fe27c1198e15f897f87bf2ae2157bca27588cea1f3a20f8c96b461c85598dd7

  • SHA512

    44b35dd2f80326f789938d31286a44fca5136a70612758df5c41cd9135e9f87fbd048ba640a46e0cb988a53311ae34932d11849a3d63a025845ab4bc98a51d58

  • SSDEEP

    98304:UGdJOEwPuLnYsZLyyuWDJ6tzBYcZtYVCt/vzpeVXK3nEtJFLhXZNP2ftZ/kQNYQp:UGdIEBsWLyaDEtHHya/vIunIhpIHLp

Malware Config

Targets

    • Target

      2025-02-05_07d4199db8c5f37629248a849d368b0e_floxif_poet-rat_snatch

    • Size

      16.2MB

    • MD5

      07d4199db8c5f37629248a849d368b0e

    • SHA1

      c77ac162c233f32f2f08d59c6586ac3a186a0f81

    • SHA256

      0fe27c1198e15f897f87bf2ae2157bca27588cea1f3a20f8c96b461c85598dd7

    • SHA512

      44b35dd2f80326f789938d31286a44fca5136a70612758df5c41cd9135e9f87fbd048ba640a46e0cb988a53311ae34932d11849a3d63a025845ab4bc98a51d58

    • SSDEEP

      98304:UGdJOEwPuLnYsZLyyuWDJ6tzBYcZtYVCt/vzpeVXK3nEtJFLhXZNP2ftZ/kQNYQp:UGdIEBsWLyaDEtHHya/vIunIhpIHLp

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks