General

  • Target

    2025-03-03_c4d0b88bd3948da824cc6b6346283a0b_floxif_hijackloader_mafia

  • Size

    2.7MB

  • Sample

    250303-r2d6zszry4

  • MD5

    c4d0b88bd3948da824cc6b6346283a0b

  • SHA1

    06c7266bea4957e877b4ac90499c2685bdf622ce

  • SHA256

    1a6914387221aa49719746ed5c6917f2ae3b8eb204a6d71bd1e5d99c33111528

  • SHA512

    b5a097d2c995905e651aab9d84aed071dcf067ac48b311196dd45d00b2b85cd5bae0ba8779397d05fa4ffd34444b28786a69b1bd48829afcc56073b8b48d6530

  • SSDEEP

    49152:2Pf6VdMQTNRbg239Nw//7vgseqziRS1UsrzoeNFZeB5c71y9Bx4M3W/KMZKWKKFt:2q1Rz3Xw//7vgVqziRS1Usrzppq5y1yI

Malware Config

Targets

    • Target

      2025-03-03_c4d0b88bd3948da824cc6b6346283a0b_floxif_hijackloader_mafia

    • Size

      2.7MB

    • MD5

      c4d0b88bd3948da824cc6b6346283a0b

    • SHA1

      06c7266bea4957e877b4ac90499c2685bdf622ce

    • SHA256

      1a6914387221aa49719746ed5c6917f2ae3b8eb204a6d71bd1e5d99c33111528

    • SHA512

      b5a097d2c995905e651aab9d84aed071dcf067ac48b311196dd45d00b2b85cd5bae0ba8779397d05fa4ffd34444b28786a69b1bd48829afcc56073b8b48d6530

    • SSDEEP

      49152:2Pf6VdMQTNRbg239Nw//7vgseqziRS1UsrzoeNFZeB5c71y9Bx4M3W/KMZKWKKFt:2q1Rz3Xw//7vgVqziRS1Usrzppq5y1yI

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks