Floxif is a malicious application that was distributed using corrupted CCleaner (5.33.6162) and CCleaner Cloud (1.07.3191) versions. CCleaner is a legitimate and very popular PC cleaning tool, but cybercriminals managed to infiltrate its development and inject a backdoor into it, thus forcing it to install Floxif. If you have the free version CCleaner, then it is likely that you have Floxif on it as well. While this Trojan is non-functional now, you should delete it regardless because there is no telling what it might do if left unchecked. This article is dedicated to the safe removal of this malware, but if you want to find out more about it, then read this whole article.
It has been revealed that this malicious application was distributed by corrupted CCleaner versions for nearly a month and the cybercriminals managed to infect more than 2 million computers. The group of cybercriminals that perpetrated this cyber attack on Piriform’s (the company that developed CCleaner) servers call themselves Axiom and this group is, allegedly, based in China.
According to Piriform, CCleaner was compromised by Axiom during the development phase of the free CCleaner (5.33.6162) and CCleaner Cloud (1.07.3191) versions for 32-bit versions of Windows. The backdoor that was put into this PC cleaner was discovered by two third-party cyber security around the same time. If you install a corrupted version of CCleaner, Floxif will also be dripped and executed. It runs a script that drops a .dll file named symsrv.dll. The file size is 67 KB, and it is placed in C:\Program Files\Common Files\System\symsrv.dll.
It has been revealed that Floxif was configured to collect and send technical information about users’ computers which included installed software, computer names, running processes, MAC addresses, and computer IDs. This Trojan stores the collected information in %System Drive%\pagefile.pif, %System Drive%\autorun.inf, and %Temp%\update.exe files. Lso it was set to execute the update.exe file automatically. Furthermore, will delete files in %Program Files%\Common Files\System\symsrv.dll.dat and %Users%\Administrator\Local\Temp\…\*.tmp.
Axiom hacked Piriform’s servers in Mid-August of 2017 and the corrupted CCleaner versions were distributed until Mid-September that same year. The Trojan ran in the background silently and sent collected information to Axiom’s servers. It has been revealed that the Trojan connected to 18.104.22.168 IP address. It has since been revealed that the Trojan attack was meant to compromise the systems of well-known international companies such as Google, Epson, MSI, Oracle, Cisco and many others.
We have found that this Trojan drops a sub-key in Windows Registry under the name “Agomo” at HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\Agomo. To execute the malware on system startup, this Trojan can add a registry entry in the Windows Registry located in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\. The sub-keys added include AppInit_DLLs with value data C:\Program Files\¬Common Files\System\-symsrv.dll and LoadAppInit_DLLs with value data 1. Furthermore, Floxif may also configure registry keys to remain hidden on your computer. To achieve that It was set to create registry entries that include the following:
These registry keys contain ShowSuperHidden = 0, NoDriveTypeAutoRun = 145. Type = radio, and SFCDisable = 4294967197 value data entries respectively. The analysis has also revealed that this Trojan was set to connect with the following Windows application programming interfaces (APIs):
To summarize, Floxif is a dangerous Trojan that was distributed through corrupted free CCleaner versions. It was meant to collect technical information about you but, luckily, this Trojan was unable to do any harm. While is it now dead, you should remove it if you have it your PC. We recommend using SpyHunter’s free scanner to detect this Trojan, and then go to the location of its malicious files and delete them manually.