General

  • Target

    2025-02-07_97a412e25f70ebda61e8e80183f3d60e_floxif_mafia

  • Size

    2.2MB

  • Sample

    250207-hn9ajaspey

  • MD5

    97a412e25f70ebda61e8e80183f3d60e

  • SHA1

    cee61e7f410ccff3e517cafd35b588bd9830f4c4

  • SHA256

    d9a8023ffce6526fe4e66eb34e78b8f11163c0688e0fdf2d7283be5544f56d8e

  • SHA512

    32ebcd47fa5aaa628cfb48c1acafdefddd8bca68cd582f72295f603fb23d148da032e332a70a481f9ad41a2176047fee69346ea99b38bc2023713493c13de73d

  • SSDEEP

    49152:Kc6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7PJDz3pVO6pBfLP8rIdhOMRL5wyOKSeO:6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7I

Malware Config

Targets

    • Target

      2025-02-07_97a412e25f70ebda61e8e80183f3d60e_floxif_mafia

    • Size

      2.2MB

    • MD5

      97a412e25f70ebda61e8e80183f3d60e

    • SHA1

      cee61e7f410ccff3e517cafd35b588bd9830f4c4

    • SHA256

      d9a8023ffce6526fe4e66eb34e78b8f11163c0688e0fdf2d7283be5544f56d8e

    • SHA512

      32ebcd47fa5aaa628cfb48c1acafdefddd8bca68cd582f72295f603fb23d148da032e332a70a481f9ad41a2176047fee69346ea99b38bc2023713493c13de73d

    • SSDEEP

      49152:Kc6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7PJDz3pVO6pBfLP8rIdhOMRL5wyOKSeO:6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7I

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks