General
-
Target
2024-04-20_e8054fe0bdcde72db8a8f6cc3034de7d_floxif_mafia
-
Size
2.7MB
-
Sample
240420-gjk7gaag3y
-
MD5
e8054fe0bdcde72db8a8f6cc3034de7d
-
SHA1
ec5c5a78ed0f7ccdd9b676095a7c229c9fda709c
-
SHA256
821bf1c21236a7ddfcb4c871e59ecede61917a0a5491b72f0128cce5e79ac61b
-
SHA512
e938454792be30ac55f5e27c22bceb769fc503c68d373178769da922c9404fc720c2ba2ec081715e8276ca18092c3cc8d19f5439d7c39fd6540ed3581eb7f015
-
SSDEEP
49152:KaSofyDdWWKXBhgmvQojZ2toFPVmyN8yrOR23P2yYI1p7B5lcdtH9jR9W/KMZKWQ:LudOBhzQoMtoFPVmyN8yrOR23O8H77lm
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_e8054fe0bdcde72db8a8f6cc3034de7d_floxif_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-20_e8054fe0bdcde72db8a8f6cc3034de7d_floxif_mafia.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-04-20_e8054fe0bdcde72db8a8f6cc3034de7d_floxif_mafia
-
Size
2.7MB
-
MD5
e8054fe0bdcde72db8a8f6cc3034de7d
-
SHA1
ec5c5a78ed0f7ccdd9b676095a7c229c9fda709c
-
SHA256
821bf1c21236a7ddfcb4c871e59ecede61917a0a5491b72f0128cce5e79ac61b
-
SHA512
e938454792be30ac55f5e27c22bceb769fc503c68d373178769da922c9404fc720c2ba2ec081715e8276ca18092c3cc8d19f5439d7c39fd6540ed3581eb7f015
-
SSDEEP
49152:KaSofyDdWWKXBhgmvQojZ2toFPVmyN8yrOR23P2yYI1p7B5lcdtH9jR9W/KMZKWQ:LudOBhzQoMtoFPVmyN8yrOR23O8H77lm
Score9/10-
UPX dump on OEP (original entry point)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-