General
-
Target
2024-06-14_a0e8b7a5d7f08bb3fadb25d67e52e7d0_floxif_mafia
-
Size
2.5MB
-
Sample
240614-pqebhavarl
-
MD5
a0e8b7a5d7f08bb3fadb25d67e52e7d0
-
SHA1
7e502a4d401cbf7ab3cdfc99f2e42a39d738817c
-
SHA256
dbcc854504cf575828c9f07e79bbee51ab8a1af53a05c5c84bafaddb3cead70f
-
SHA512
2148be645fc1aae56c7f8ee8fb399262862998395f8683b51298a973719c9bdea9a7cc6f5a1e05f4302b6ad8aa829b63237c75b2dea9e030b2af82830784660c
-
SSDEEP
49152:8uIIKnofs2hPd2l177BTK2VbDsar1YDjAB:8jqfs2hPIl1/t
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_a0e8b7a5d7f08bb3fadb25d67e52e7d0_floxif_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-14_a0e8b7a5d7f08bb3fadb25d67e52e7d0_floxif_mafia.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-06-14_a0e8b7a5d7f08bb3fadb25d67e52e7d0_floxif_mafia
-
Size
2.5MB
-
MD5
a0e8b7a5d7f08bb3fadb25d67e52e7d0
-
SHA1
7e502a4d401cbf7ab3cdfc99f2e42a39d738817c
-
SHA256
dbcc854504cf575828c9f07e79bbee51ab8a1af53a05c5c84bafaddb3cead70f
-
SHA512
2148be645fc1aae56c7f8ee8fb399262862998395f8683b51298a973719c9bdea9a7cc6f5a1e05f4302b6ad8aa829b63237c75b2dea9e030b2af82830784660c
-
SSDEEP
49152:8uIIKnofs2hPd2l177BTK2VbDsar1YDjAB:8jqfs2hPIl1/t
Score9/10-
UPX dump on OEP (original entry point)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-