General

  • Target

    2024-04-20_c2e27ade7a0bdfdfe81c4a99fc41b95b_floxif_mafia

  • Size

    1.8MB

  • Sample

    240420-gerhpaaf3v

  • MD5

    c2e27ade7a0bdfdfe81c4a99fc41b95b

  • SHA1

    7156dc058c828c5b4b83336f4f8f76383ed29459

  • SHA256

    9a3c22ac3ddb7d2d9946a57eb85081b07dca189e12d24d2621c8e9f82cbc4eb2

  • SHA512

    73359c99914f01ce6946de5f13a1856e795ec0613d1d5a832e33fe1f58f432939037c6d4ae93d31caf6c082bcfc8ce87a379bd940baabb1454b36eac85dcbb4f

  • SSDEEP

    49152:HF1bfCfPNrnlR+X2KOGtlzu6Ax9Yde2WimzPtClVhBS5s4vXATgsON:OnNBR+3OGtlzu6Ax9YE2R2tCVhBGs4v1

Score
9/10

Malware Config

Targets

    • Target

      2024-04-20_c2e27ade7a0bdfdfe81c4a99fc41b95b_floxif_mafia

    • Size

      1.8MB

    • MD5

      c2e27ade7a0bdfdfe81c4a99fc41b95b

    • SHA1

      7156dc058c828c5b4b83336f4f8f76383ed29459

    • SHA256

      9a3c22ac3ddb7d2d9946a57eb85081b07dca189e12d24d2621c8e9f82cbc4eb2

    • SHA512

      73359c99914f01ce6946de5f13a1856e795ec0613d1d5a832e33fe1f58f432939037c6d4ae93d31caf6c082bcfc8ce87a379bd940baabb1454b36eac85dcbb4f

    • SSDEEP

      49152:HF1bfCfPNrnlR+X2KOGtlzu6Ax9Yde2WimzPtClVhBS5s4vXATgsON:OnNBR+3OGtlzu6Ax9YE2R2tCVhBGs4v1

    Score
    9/10
    • UPX dump on OEP (original entry point)

    • Modifies AppInit DLL entries

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks