General
-
Target
2024-08-16_6965691772ccd78b10deb5f10d05156c_floxif_mafia
-
Size
2.5MB
-
Sample
240816-ppb5ravbjf
-
MD5
6965691772ccd78b10deb5f10d05156c
-
SHA1
00bb5fdf4152ef1ee4a2de7f16d3fec062ec7c54
-
SHA256
46b755636cbdeb0ee284865b2b48f136f28ccd27fbd0f61bb7c9fb551baba674
-
SHA512
74d9189ba76415a591bec85c8939c5f9855e1b79145548ceda9cb4d854e0292dec65b97ff1baadef82a531cfdde3a05651dd76d5e384e23119d75c0a24705a48
-
SSDEEP
49152:duIIK4ofs2hPd2l177BTK2VbDsar1YDjZ:djBfs2hPIl1/S
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-16_6965691772ccd78b10deb5f10d05156c_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-08-16_6965691772ccd78b10deb5f10d05156c_floxif_mafia
-
Size
2.5MB
-
MD5
6965691772ccd78b10deb5f10d05156c
-
SHA1
00bb5fdf4152ef1ee4a2de7f16d3fec062ec7c54
-
SHA256
46b755636cbdeb0ee284865b2b48f136f28ccd27fbd0f61bb7c9fb551baba674
-
SHA512
74d9189ba76415a591bec85c8939c5f9855e1b79145548ceda9cb4d854e0292dec65b97ff1baadef82a531cfdde3a05651dd76d5e384e23119d75c0a24705a48
-
SSDEEP
49152:duIIK4ofs2hPd2l177BTK2VbDsar1YDjZ:djBfs2hPIl1/S
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-