General
-
Target
2024-04-20_c2e27ade7a0bdfdfe81c4a99fc41b95b_floxif_mafia
-
Size
1.8MB
-
Sample
240420-gerhpaaf3v
-
MD5
c2e27ade7a0bdfdfe81c4a99fc41b95b
-
SHA1
7156dc058c828c5b4b83336f4f8f76383ed29459
-
SHA256
9a3c22ac3ddb7d2d9946a57eb85081b07dca189e12d24d2621c8e9f82cbc4eb2
-
SHA512
73359c99914f01ce6946de5f13a1856e795ec0613d1d5a832e33fe1f58f432939037c6d4ae93d31caf6c082bcfc8ce87a379bd940baabb1454b36eac85dcbb4f
-
SSDEEP
49152:HF1bfCfPNrnlR+X2KOGtlzu6Ax9Yde2WimzPtClVhBS5s4vXATgsON:OnNBR+3OGtlzu6Ax9YE2R2tCVhBGs4v1
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_c2e27ade7a0bdfdfe81c4a99fc41b95b_floxif_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_c2e27ade7a0bdfdfe81c4a99fc41b95b_floxif_mafia.exe
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
2024-04-20_c2e27ade7a0bdfdfe81c4a99fc41b95b_floxif_mafia
-
Size
1.8MB
-
MD5
c2e27ade7a0bdfdfe81c4a99fc41b95b
-
SHA1
7156dc058c828c5b4b83336f4f8f76383ed29459
-
SHA256
9a3c22ac3ddb7d2d9946a57eb85081b07dca189e12d24d2621c8e9f82cbc4eb2
-
SHA512
73359c99914f01ce6946de5f13a1856e795ec0613d1d5a832e33fe1f58f432939037c6d4ae93d31caf6c082bcfc8ce87a379bd940baabb1454b36eac85dcbb4f
-
SSDEEP
49152:HF1bfCfPNrnlR+X2KOGtlzu6Ax9Yde2WimzPtClVhBS5s4vXATgsON:OnNBR+3OGtlzu6Ax9YE2R2tCVhBGs4v1
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-