General
-
Target
2024-08-23_df3442090dc9d7da1c52436f5dec2fff_floxif_mafia
-
Size
1.8MB
-
Sample
240823-198v1azglb
-
MD5
df3442090dc9d7da1c52436f5dec2fff
-
SHA1
62675560d38af99f5ddd64bf13084422a404a3e4
-
SHA256
8bd40ae225e79f4ff825ef6f6d09c7401cc3f4f21c1c216d42c8d2446c6c1ee1
-
SHA512
6d7dd68a72dad2beacf060cc9c26e2665607a4805f8bef6ae2114489e45456e140a79cb6c1e7b5db132506601975b792d4abe537ad94ac1bf43ffc5bd460f0be
-
SSDEEP
49152:OpEKgw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2YijiS:+wYJYk
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-23_df3442090dc9d7da1c52436f5dec2fff_floxif_mafia.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-23_df3442090dc9d7da1c52436f5dec2fff_floxif_mafia
-
Size
1.8MB
-
MD5
df3442090dc9d7da1c52436f5dec2fff
-
SHA1
62675560d38af99f5ddd64bf13084422a404a3e4
-
SHA256
8bd40ae225e79f4ff825ef6f6d09c7401cc3f4f21c1c216d42c8d2446c6c1ee1
-
SHA512
6d7dd68a72dad2beacf060cc9c26e2665607a4805f8bef6ae2114489e45456e140a79cb6c1e7b5db132506601975b792d4abe537ad94ac1bf43ffc5bd460f0be
-
SSDEEP
49152:OpEKgw14kZV2HXsMnmjEREseBSsxHnfXsrHYi2YijiS:+wYJYk
-
Detects Floxif payload
-
Drops file in Drivers directory
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-