General

  • Target

    2025-04-03_b92c7e29d5365042db9e18c3a47a2410_black-basta_floxif_luca-stealer

  • Size

    209KB

  • Sample

    250403-yaszdsvqx9

  • MD5

    b92c7e29d5365042db9e18c3a47a2410

  • SHA1

    d44d6a26e871c184da6119e34aafc9f35dfd107e

  • SHA256

    df92cdc7a0f8493a571644c6da905697f169ae9de9442742893649e4244cd41f

  • SHA512

    5886834876f0bfe0a3ab26aa2365ce3521cf4928db2fce8cf539b08b79b115b97c45f8d07c4eed3d5a3ebc6fb09447aa768d3bf1e207bec9cb5fa18cc14c3b31

  • SSDEEP

    3072:idCClucgfn8xt7ke4YgG1CkCAuVnM3pdkPbN2lQBV+UdE+rECWp7hKeDrL9:aZlucnxt7keaMbOxBV+UdvrEFp7hKY

Malware Config

Targets

    • Target

      2025-04-03_b92c7e29d5365042db9e18c3a47a2410_black-basta_floxif_luca-stealer

    • Size

      209KB

    • MD5

      b92c7e29d5365042db9e18c3a47a2410

    • SHA1

      d44d6a26e871c184da6119e34aafc9f35dfd107e

    • SHA256

      df92cdc7a0f8493a571644c6da905697f169ae9de9442742893649e4244cd41f

    • SHA512

      5886834876f0bfe0a3ab26aa2365ce3521cf4928db2fce8cf539b08b79b115b97c45f8d07c4eed3d5a3ebc6fb09447aa768d3bf1e207bec9cb5fa18cc14c3b31

    • SSDEEP

      3072:idCClucgfn8xt7ke4YgG1CkCAuVnM3pdkPbN2lQBV+UdE+rECWp7hKeDrL9:aZlucnxt7keaMbOxBV+UdvrEFp7hKY

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks