General
-
Target
2024-07-31_3e06e362d39dc231b9c785a0fe3cb31a_floxif_mafia
-
Size
2.5MB
-
Sample
240731-rr3ftsxgqk
-
MD5
3e06e362d39dc231b9c785a0fe3cb31a
-
SHA1
4af30d64b322db5289596de0a597830000c33d3d
-
SHA256
eafa7c85803e5bf9439f362d3b35d6731b0a0feaa98c8fb78919aaa2b1ce1ad9
-
SHA512
0a502f3c4c89a0aa5bca70da37c971b8dac2a811a699df71a9fca066567ccefffaaa56fc6c1d8d5870ea13b047555e409b2b263ec2ceb441e381e57ae7989925
-
SSDEEP
49152:tu0IKZofs2hPd2l177BTK2VbDsar1YDju:tL4fs2hPIl1/5
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-31_3e06e362d39dc231b9c785a0fe3cb31a_floxif_mafia.exe
Resource
win7-20240705-en
Malware Config
Targets
-
-
Target
2024-07-31_3e06e362d39dc231b9c785a0fe3cb31a_floxif_mafia
-
Size
2.5MB
-
MD5
3e06e362d39dc231b9c785a0fe3cb31a
-
SHA1
4af30d64b322db5289596de0a597830000c33d3d
-
SHA256
eafa7c85803e5bf9439f362d3b35d6731b0a0feaa98c8fb78919aaa2b1ce1ad9
-
SHA512
0a502f3c4c89a0aa5bca70da37c971b8dac2a811a699df71a9fca066567ccefffaaa56fc6c1d8d5870ea13b047555e409b2b263ec2ceb441e381e57ae7989925
-
SSDEEP
49152:tu0IKZofs2hPd2l177BTK2VbDsar1YDju:tL4fs2hPIl1/5
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-