General
-
Target
2024-04-17_b482e0b4ed1daff702e9e8c71e44ef8c_floxif_mafia
-
Size
2.5MB
-
Sample
240417-a5gmvaae2t
-
MD5
b482e0b4ed1daff702e9e8c71e44ef8c
-
SHA1
abe26bbfe8f4295d1156e9e0369a1c86b254d6bb
-
SHA256
03d17f9bd97e32137302b29fd09085a3f810f33e6c4105957bf38b43a6bc1f7b
-
SHA512
6e0e02bc886d7b12b1287e27c058c4b966608594b2c0e04325741580faa09895812a25b82b16d36d599602698ea10bdfa6e725f8df44d1877bf828f1e4ac1fb3
-
SSDEEP
49152:pmhcbMDOyZLi/N3iKTqOw7XYym7U4aFvsO1CThFhu7vLruwqf+tP:pmpiyZu/N3cOw7XSU4aFvsO1X7vr
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-17_b482e0b4ed1daff702e9e8c71e44ef8c_floxif_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-17_b482e0b4ed1daff702e9e8c71e44ef8c_floxif_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-17_b482e0b4ed1daff702e9e8c71e44ef8c_floxif_mafia
-
Size
2.5MB
-
MD5
b482e0b4ed1daff702e9e8c71e44ef8c
-
SHA1
abe26bbfe8f4295d1156e9e0369a1c86b254d6bb
-
SHA256
03d17f9bd97e32137302b29fd09085a3f810f33e6c4105957bf38b43a6bc1f7b
-
SHA512
6e0e02bc886d7b12b1287e27c058c4b966608594b2c0e04325741580faa09895812a25b82b16d36d599602698ea10bdfa6e725f8df44d1877bf828f1e4ac1fb3
-
SSDEEP
49152:pmhcbMDOyZLi/N3iKTqOw7XYym7U4aFvsO1CThFhu7vLruwqf+tP:pmpiyZu/N3cOw7XSU4aFvsO1X7vr
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-