General

  • Target

    2025-04-23_7cfa62041d36f64405a7309af28674ad_amadey_elex_floxif_smoke-loader

  • Size

    300KB

  • Sample

    250423-2a3elsssby

  • MD5

    7cfa62041d36f64405a7309af28674ad

  • SHA1

    8329c1aafe542ae663005e25fc8373a8fa471318

  • SHA256

    5864ef65d9d1d63874a15154432d8e863418743c01833cefa25da78698185741

  • SHA512

    6e5f190afb7d879b4ee9c7230006302304a5e11a9a60db52647bba38c8bb1eb157d7979105e41fa2cd7b16c88efe0a4cf6032fcea00d387dffa0265fda01ef4a

  • SSDEEP

    6144:UIan1R0oQgD3R4y2o+yP4C/Q+BtDrSAUCHKBV+UdvrEFp7hKb:m1xD3684UBtDrxoBjvrEH7Y

Malware Config

Targets

    • Target

      2025-04-23_7cfa62041d36f64405a7309af28674ad_amadey_elex_floxif_smoke-loader

    • Size

      300KB

    • MD5

      7cfa62041d36f64405a7309af28674ad

    • SHA1

      8329c1aafe542ae663005e25fc8373a8fa471318

    • SHA256

      5864ef65d9d1d63874a15154432d8e863418743c01833cefa25da78698185741

    • SHA512

      6e5f190afb7d879b4ee9c7230006302304a5e11a9a60db52647bba38c8bb1eb157d7979105e41fa2cd7b16c88efe0a4cf6032fcea00d387dffa0265fda01ef4a

    • SSDEEP

      6144:UIan1R0oQgD3R4y2o+yP4C/Q+BtDrSAUCHKBV+UdvrEFp7hKb:m1xD3684UBtDrxoBjvrEH7Y

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks