General

  • Target

    2024-05-12_371de9b49f20837fbb3fb693431c56b3_floxif_mafia

  • Size

    2.5MB

  • Sample

    240512-plgaashf67

  • MD5

    371de9b49f20837fbb3fb693431c56b3

  • SHA1

    9bc11640d2143c2dafcfdeb5895fd4102953ff2d

  • SHA256

    0519798be818a74e16948353110d6c567ea7ca6816cdf486bc3cabf819f5aa01

  • SHA512

    8b7e04dd3be580788a2c8364f0686fc8ab45b7a0303bb8077c720aeb712757ae0d07c0f5d9529fedfc9f75d5c874ffb994fc149af428a4c039de5ff6bed6b099

  • SSDEEP

    49152:tuII9jofs2hPd2l177BTK2VbDsar1YDj7:tjrfs2hPIl1/w

Score
9/10
upx

Malware Config

Targets

    • Target

      2024-05-12_371de9b49f20837fbb3fb693431c56b3_floxif_mafia

    • Size

      2.5MB

    • MD5

      371de9b49f20837fbb3fb693431c56b3

    • SHA1

      9bc11640d2143c2dafcfdeb5895fd4102953ff2d

    • SHA256

      0519798be818a74e16948353110d6c567ea7ca6816cdf486bc3cabf819f5aa01

    • SHA512

      8b7e04dd3be580788a2c8364f0686fc8ab45b7a0303bb8077c720aeb712757ae0d07c0f5d9529fedfc9f75d5c874ffb994fc149af428a4c039de5ff6bed6b099

    • SSDEEP

      49152:tuII9jofs2hPd2l177BTK2VbDsar1YDj7:tjrfs2hPIl1/w

    Score
    9/10
    • UPX dump on OEP (original entry point)

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Matrix

Tasks