General
-
Target
2024-02-24_e7e5f03002f0d8135548717d77509f56_floxif_mafia
-
Size
2.5MB
-
Sample
240224-pn8gkacc8x
-
MD5
e7e5f03002f0d8135548717d77509f56
-
SHA1
a6fedca1845067f37607340acb40707641dfc9b6
-
SHA256
c2940152fb7ce47fe5e2b0ffe359740900f97f297210e18661765981d971b0f2
-
SHA512
e92811a381b04bd5e14beda06e6efb1057c4de49d57d1bfd3dc5c73635f712f115dbd264a5ab70020b1bbb440d02d0a41f9aa95078d351d2f6be41d4cfe5633f
-
SSDEEP
49152:tuIlK6ofs2hPd2l177BTK2VbDsar1YDjh:tj4fs2hPIl1/+
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_e7e5f03002f0d8135548717d77509f56_floxif_mafia.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-02-24_e7e5f03002f0d8135548717d77509f56_floxif_mafia.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
2024-02-24_e7e5f03002f0d8135548717d77509f56_floxif_mafia
-
Size
2.5MB
-
MD5
e7e5f03002f0d8135548717d77509f56
-
SHA1
a6fedca1845067f37607340acb40707641dfc9b6
-
SHA256
c2940152fb7ce47fe5e2b0ffe359740900f97f297210e18661765981d971b0f2
-
SHA512
e92811a381b04bd5e14beda06e6efb1057c4de49d57d1bfd3dc5c73635f712f115dbd264a5ab70020b1bbb440d02d0a41f9aa95078d351d2f6be41d4cfe5633f
-
SSDEEP
49152:tuIlK6ofs2hPd2l177BTK2VbDsar1YDjh:tj4fs2hPIl1/+
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-