Resubmissions

08/05/2025, 05:37

250508-ga6rtabk8v 10

08/05/2025, 02:15

250508-cpvwmshm7v 8

General

  • Target

    https://gofile.io/d/TX2I0q

  • Sample

    250508-ga6rtabk8v

Malware Config

Targets

    • Target

      https://gofile.io/d/TX2I0q

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Drops file in Drivers directory

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »