General

  • Target

    2025-03-03_ad6d029bd2af3b8580bbef840fa66a70_floxif_mafia

  • Size

    2.5MB

  • Sample

    250303-pzy29syjz6

  • MD5

    ad6d029bd2af3b8580bbef840fa66a70

  • SHA1

    be0ba79a4a841042bdcc91d36a5543ad105971d9

  • SHA256

    a9dd55571d06b98200ac5f80547706465090a33f20aad6f32cbdff3761ef8256

  • SHA512

    5d9af3cfa17ea5e761adaf7b591a7c0c3c49d031d3ac6562a5aa3b5cb89e6a9da3e6754439f5c609c17bc676f0d269223de5608a0fa046400931dabdb11bab26

  • SSDEEP

    49152:5uIIKlofs2hPd2l177BTK2VbDsar1YDjN:5jgfs2hPIl1/y

Malware Config

Targets

    • Target

      2025-03-03_ad6d029bd2af3b8580bbef840fa66a70_floxif_mafia

    • Size

      2.5MB

    • MD5

      ad6d029bd2af3b8580bbef840fa66a70

    • SHA1

      be0ba79a4a841042bdcc91d36a5543ad105971d9

    • SHA256

      a9dd55571d06b98200ac5f80547706465090a33f20aad6f32cbdff3761ef8256

    • SHA512

      5d9af3cfa17ea5e761adaf7b591a7c0c3c49d031d3ac6562a5aa3b5cb89e6a9da3e6754439f5c609c17bc676f0d269223de5608a0fa046400931dabdb11bab26

    • SSDEEP

      49152:5uIIKlofs2hPd2l177BTK2VbDsar1YDjN:5jgfs2hPIl1/y

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks