General

  • Target

    2025-04-24_26b37f87299391aca9403b6357f586ae_amadey_elex_floxif_smoke-loader

  • Size

    347KB

  • Sample

    250424-csqq4awwhv

  • MD5

    26b37f87299391aca9403b6357f586ae

  • SHA1

    216f27ae12ddb5c61638b45b31fefa0d873234bc

  • SHA256

    87fb81e951dbf22845806faf8d7c5139c25c76d1cc8d04725cbbf1eff22353c5

  • SHA512

    0846e89067244d7d42c299eade6e5c3e84a1cf64dc3aad5422dac14e3877aef55333571692690359148dab9d11dd15e348b0ab378ad449fa4471b8ffc8f2394c

  • SSDEEP

    6144:AwOl40oRey2d2vZw0svc1Wi4/SgGQ3HnfLgBV+UdvrEFp7hK5J:2vy2Uxw/c1fcSkfLgBjvrEH7Y

Malware Config

Targets

    • Target

      2025-04-24_26b37f87299391aca9403b6357f586ae_amadey_elex_floxif_smoke-loader

    • Size

      347KB

    • MD5

      26b37f87299391aca9403b6357f586ae

    • SHA1

      216f27ae12ddb5c61638b45b31fefa0d873234bc

    • SHA256

      87fb81e951dbf22845806faf8d7c5139c25c76d1cc8d04725cbbf1eff22353c5

    • SHA512

      0846e89067244d7d42c299eade6e5c3e84a1cf64dc3aad5422dac14e3877aef55333571692690359148dab9d11dd15e348b0ab378ad449fa4471b8ffc8f2394c

    • SSDEEP

      6144:AwOl40oRey2d2vZw0svc1Wi4/SgGQ3HnfLgBV+UdvrEFp7hK5J:2vy2Uxw/c1fcSkfLgBjvrEH7Y

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks