General
-
Target
2024-08-08_bb32862b65efeab1ee1a9ef6e2921517_floxif_mafia
-
Size
1.8MB
-
Sample
240808-ske8dsyerd
-
MD5
bb32862b65efeab1ee1a9ef6e2921517
-
SHA1
3e479a462634699b4cc9344b53a667fcb40e3a17
-
SHA256
7e81d5d4e892165986e8d6b85a3dca2bb6d93b271be650d98dfc2ad0ad77398b
-
SHA512
ff449f5c4ccbb0da7dc6d48e41688e762e34717dd3f6d34dd2185e7ec525307b4204f9493b31fd6d4c7fcc439968e3840aa3e42af1cda734ae405e30857c3ac5
-
SSDEEP
49152:mSRFWpiIUDnQOklug56b5KEZccMqR2OdWc9hl69pjDgO/rF9sSV2RB:mwWpiICnGll6b5KEO5qR9dW469pQO/r8
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_bb32862b65efeab1ee1a9ef6e2921517_floxif_mafia.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-08_bb32862b65efeab1ee1a9ef6e2921517_floxif_mafia.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-08-08_bb32862b65efeab1ee1a9ef6e2921517_floxif_mafia
-
Size
1.8MB
-
MD5
bb32862b65efeab1ee1a9ef6e2921517
-
SHA1
3e479a462634699b4cc9344b53a667fcb40e3a17
-
SHA256
7e81d5d4e892165986e8d6b85a3dca2bb6d93b271be650d98dfc2ad0ad77398b
-
SHA512
ff449f5c4ccbb0da7dc6d48e41688e762e34717dd3f6d34dd2185e7ec525307b4204f9493b31fd6d4c7fcc439968e3840aa3e42af1cda734ae405e30857c3ac5
-
SSDEEP
49152:mSRFWpiIUDnQOklug56b5KEZccMqR2OdWc9hl69pjDgO/rF9sSV2RB:mwWpiICnGll6b5KEO5qR9dW469pQO/r8
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-