General

  • Target

    2025-04-04_20563cb92f21094282b8a7cca2f056e6_amadey_black-basta_floxif_hijackloader_luca-stealer

  • Size

    2.0MB

  • Sample

    250404-jd8fxsvlw8

  • MD5

    20563cb92f21094282b8a7cca2f056e6

  • SHA1

    08d72747b4839904b4be8f0a1dd9890b2d3c66c1

  • SHA256

    6271ec44283f7f2d31aaa916e8fa7a23a000f629dee82dffe88ad275d21f2cdb

  • SHA512

    25c0984ca0c69130af604060909b04befb637ad70400c7f706323e1f6ee73f2c3cc1d2c296a202eee5c2fc75f5bdeb6f7220a98be9e8421d36d3c4049af63401

  • SSDEEP

    49152:xGGpHjHVXN4bsKzaLeP9BxjEovLeGsHofdabsHofdaQ9BxjEodt:xrj19jKz1PRYfG3f4b3f4QRYMt

Malware Config

Targets

    • Target

      2025-04-04_20563cb92f21094282b8a7cca2f056e6_amadey_black-basta_floxif_hijackloader_luca-stealer

    • Size

      2.0MB

    • MD5

      20563cb92f21094282b8a7cca2f056e6

    • SHA1

      08d72747b4839904b4be8f0a1dd9890b2d3c66c1

    • SHA256

      6271ec44283f7f2d31aaa916e8fa7a23a000f629dee82dffe88ad275d21f2cdb

    • SHA512

      25c0984ca0c69130af604060909b04befb637ad70400c7f706323e1f6ee73f2c3cc1d2c296a202eee5c2fc75f5bdeb6f7220a98be9e8421d36d3c4049af63401

    • SSDEEP

      49152:xGGpHjHVXN4bsKzaLeP9BxjEovLeGsHofdabsHofdaQ9BxjEodt:xrj19jKz1PRYfG3f4b3f4QRYMt

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Stops running service(s)

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks