General
-
Target
2024-07-31_6d75c4d854ce804ad880042ff9293ccc_floxif_mafia
-
Size
2.5MB
-
Sample
240731-rsyt2aseqd
-
MD5
6d75c4d854ce804ad880042ff9293ccc
-
SHA1
96a49c2cba6855506f879b3558772eba12586c9c
-
SHA256
adabff73ebca6dcbce562f84683cb196d7f1020c527baa6e280fb2de92982c3a
-
SHA512
2e46350b0ebcaecf1e31f2eafaa304a3e60303badd4abd97dd0dd18004f35eab75a1f5b3d02bba0551b83f8393ecf1547560ba173ef1e7f151c9be22822acd83
-
SSDEEP
49152:tuIKKGofs2hPd2l177BTK2VbDsar1YDju:tj9fs2hPIl1/B
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-31_6d75c4d854ce804ad880042ff9293ccc_floxif_mafia.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-07-31_6d75c4d854ce804ad880042ff9293ccc_floxif_mafia
-
Size
2.5MB
-
MD5
6d75c4d854ce804ad880042ff9293ccc
-
SHA1
96a49c2cba6855506f879b3558772eba12586c9c
-
SHA256
adabff73ebca6dcbce562f84683cb196d7f1020c527baa6e280fb2de92982c3a
-
SHA512
2e46350b0ebcaecf1e31f2eafaa304a3e60303badd4abd97dd0dd18004f35eab75a1f5b3d02bba0551b83f8393ecf1547560ba173ef1e7f151c9be22822acd83
-
SSDEEP
49152:tuIKKGofs2hPd2l177BTK2VbDsar1YDju:tj9fs2hPIl1/B
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-