General
-
Target
2024-08-06_84cfd8e1b990196148a213882241af53_floxif_mafia
-
Size
1.0MB
-
Sample
240806-bfbkzayard
-
MD5
84cfd8e1b990196148a213882241af53
-
SHA1
dd3c2298cd43777928277ed424736a0b76e91e14
-
SHA256
632213e9be81cb37ed3bdecfbf242d639d03656ff92781ff14ae100581c43f33
-
SHA512
542e9f187250009b3df4c1e82652049f17b8420fbe731c2903f57fcd9455c819148851b52fb574e4830e25c3329a3ea9045bf1c68336bab4cbfad5fc1141243c
-
SSDEEP
24576:fMMDnOzpvzpS1ob+xCYV9A99JqgMRGJ/qof/:fjIrp+ob+MYVejJP1qC
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_84cfd8e1b990196148a213882241af53_floxif_mafia.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-06_84cfd8e1b990196148a213882241af53_floxif_mafia.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-06_84cfd8e1b990196148a213882241af53_floxif_mafia
-
Size
1.0MB
-
MD5
84cfd8e1b990196148a213882241af53
-
SHA1
dd3c2298cd43777928277ed424736a0b76e91e14
-
SHA256
632213e9be81cb37ed3bdecfbf242d639d03656ff92781ff14ae100581c43f33
-
SHA512
542e9f187250009b3df4c1e82652049f17b8420fbe731c2903f57fcd9455c819148851b52fb574e4830e25c3329a3ea9045bf1c68336bab4cbfad5fc1141243c
-
SSDEEP
24576:fMMDnOzpvzpS1ob+xCYV9A99JqgMRGJ/qof/:fjIrp+ob+MYVejJP1qC
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-