General
-
Target
2024-04-27_dce9f941fab7fceb5270c1797105da61_floxif_mafia
-
Size
2.5MB
-
Sample
240427-el7r5sae97
-
MD5
dce9f941fab7fceb5270c1797105da61
-
SHA1
99871961f812b7a1fc77a3e66a168b070c8cf637
-
SHA256
b51bfc21c9ea02a136d0ff1e5b95490465073382c6acd3626d6ec166ebab07d7
-
SHA512
4fd07d5c80c8db4e4e0339698791a0623db428cc36f55e796abd55d059825bfcec060b31cd22c378031837e75d5c2284b7750391fa39541085109741d0725a2a
-
SSDEEP
49152:XuIcKrofs2hPd2l177BTK2VbDsar1YDjg:Xj6fs2hPIl1/r
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_dce9f941fab7fceb5270c1797105da61_floxif_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-27_dce9f941fab7fceb5270c1797105da61_floxif_mafia.exe
Resource
win10v2004-20240419-en
Malware Config
Targets
-
-
Target
2024-04-27_dce9f941fab7fceb5270c1797105da61_floxif_mafia
-
Size
2.5MB
-
MD5
dce9f941fab7fceb5270c1797105da61
-
SHA1
99871961f812b7a1fc77a3e66a168b070c8cf637
-
SHA256
b51bfc21c9ea02a136d0ff1e5b95490465073382c6acd3626d6ec166ebab07d7
-
SHA512
4fd07d5c80c8db4e4e0339698791a0623db428cc36f55e796abd55d059825bfcec060b31cd22c378031837e75d5c2284b7750391fa39541085109741d0725a2a
-
SSDEEP
49152:XuIcKrofs2hPd2l177BTK2VbDsar1YDjg:Xj6fs2hPIl1/r
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-