General

  • Target

    2025-04-03_7a79ac324cb4133629843c76e0ac166f_black-basta_cobalt-strike_floxif_hijackloader_luca-stealer

  • Size

    208KB

  • Sample

    250403-3v33bayps2

  • MD5

    7a79ac324cb4133629843c76e0ac166f

  • SHA1

    6ff96bc50b15b5537b71d28297ee87db8d6bf0cc

  • SHA256

    b355d65d881b540714d0eaabb3695c529e8c7726061b7ebcd7baa4b3d5a1abcf

  • SHA512

    0f91307e64ed3c9e538ce9c9498b556a5d4bbb73343908ac4da6597ec3d56a40efb16b7ce5377ee8b36eb13f819b4633a3444f39370f56dfbe960ed04cf8a69e

  • SSDEEP

    3072:EH0PD+CWh5lO6ZflUgNtpARctyz1zs87IgEt/+Z3j2lQBV+UdE+rECWp7hKJ/R:ESD+zXffegxAF+gNBV+UdvrEFp7hKJZ

Malware Config

Targets

    • Target

      2025-04-03_7a79ac324cb4133629843c76e0ac166f_black-basta_cobalt-strike_floxif_hijackloader_luca-stealer

    • Size

      208KB

    • MD5

      7a79ac324cb4133629843c76e0ac166f

    • SHA1

      6ff96bc50b15b5537b71d28297ee87db8d6bf0cc

    • SHA256

      b355d65d881b540714d0eaabb3695c529e8c7726061b7ebcd7baa4b3d5a1abcf

    • SHA512

      0f91307e64ed3c9e538ce9c9498b556a5d4bbb73343908ac4da6597ec3d56a40efb16b7ce5377ee8b36eb13f819b4633a3444f39370f56dfbe960ed04cf8a69e

    • SSDEEP

      3072:EH0PD+CWh5lO6ZflUgNtpARctyz1zs87IgEt/+Z3j2lQBV+UdE+rECWp7hKJ/R:ESD+zXffegxAF+gNBV+UdvrEFp7hKJZ

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks