General
-
Target
2024-08-16_55e5c2c84488958ed81ba64cd2de21ed_floxif_mafia
-
Size
2.5MB
-
Sample
240816-pnvkpsydkl
-
MD5
55e5c2c84488958ed81ba64cd2de21ed
-
SHA1
56ddcd4309a029d201131e577b5b268eddc8c888
-
SHA256
37e44d9baab1c340b12d66d828a0cae06300b8cc6da2b49a5aa458db6ccb3f5c
-
SHA512
8086fd76da4105f2ff135f5cab1f785ef4f11a168e3024b94bd9d405a10a8616644ceca06e88ac1a127c05d460384b5fb28b305661faaffb6548550c7cbcaa24
-
SSDEEP
49152:tuIEKQofs2hPd2l177BTK2VbDsar1YDj1:tjxfs2hPIl1/K
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-16_55e5c2c84488958ed81ba64cd2de21ed_floxif_mafia.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-08-16_55e5c2c84488958ed81ba64cd2de21ed_floxif_mafia
-
Size
2.5MB
-
MD5
55e5c2c84488958ed81ba64cd2de21ed
-
SHA1
56ddcd4309a029d201131e577b5b268eddc8c888
-
SHA256
37e44d9baab1c340b12d66d828a0cae06300b8cc6da2b49a5aa458db6ccb3f5c
-
SHA512
8086fd76da4105f2ff135f5cab1f785ef4f11a168e3024b94bd9d405a10a8616644ceca06e88ac1a127c05d460384b5fb28b305661faaffb6548550c7cbcaa24
-
SSDEEP
49152:tuIEKQofs2hPd2l177BTK2VbDsar1YDj1:tjxfs2hPIl1/K
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-