General

  • Target

    2025-04-24_d05e928ecafd559a02956694940b9176_amadey_black-basta_coinminer_elex_floxif_luca-stealer_revil

  • Size

    2.6MB

  • Sample

    250424-qvfksssse1

  • MD5

    d05e928ecafd559a02956694940b9176

  • SHA1

    bf20c79b7898283bc249435c1ceafd12947b5bca

  • SHA256

    152ea2e237c6475bb22e51f359967666c12d0d06539e322bcf64a3b136046991

  • SHA512

    f7c138890b7f025465519ba332a52223b15675fcf43bda30107dbe96ac3cfcfe6c2ebd11b7a0a1e0850e9a7822a4759abb1ec75317524eb2484d5861eaea95f8

  • SSDEEP

    49152:m8RtOFSZg82/1upBe3ytP4VKpHThGZ7aM0KB4JRwTckxs8sL7:m8Ro8loC6VKPGhB4JN

Malware Config

Targets

    • Target

      2025-04-24_d05e928ecafd559a02956694940b9176_amadey_black-basta_coinminer_elex_floxif_luca-stealer_revil

    • Size

      2.6MB

    • MD5

      d05e928ecafd559a02956694940b9176

    • SHA1

      bf20c79b7898283bc249435c1ceafd12947b5bca

    • SHA256

      152ea2e237c6475bb22e51f359967666c12d0d06539e322bcf64a3b136046991

    • SHA512

      f7c138890b7f025465519ba332a52223b15675fcf43bda30107dbe96ac3cfcfe6c2ebd11b7a0a1e0850e9a7822a4759abb1ec75317524eb2484d5861eaea95f8

    • SSDEEP

      49152:m8RtOFSZg82/1upBe3ytP4VKpHThGZ7aM0KB4JRwTckxs8sL7:m8Ro8loC6VKPGhB4JN

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks