General
-
Target
2024-09-05_74b6b8da4ddb13386db2f42d68529bf5_floxif_mafia
-
Size
3.4MB
-
Sample
240905-pqgrma1gpc
-
MD5
74b6b8da4ddb13386db2f42d68529bf5
-
SHA1
885ad6a1884f03b23a44078b187b2bc0a42e3415
-
SHA256
5c47bb2065ca1d9882ca3b7ea6f48ee9c374406bf625dc550248d4d0c8cbdf29
-
SHA512
c360a6e20c315aa2a47bd87a231ebbc03587809acc15375c0f4b3e84bc17ca8dbb64f19f1526390b6d7532f96065f4b911fda07e88b4a4b3100b1a96bb78dfc5
-
SSDEEP
98304:vQIQ7n4g8L1ZRER+7b6MYkjMhGs7qKnX341lfc4X:II9g8RTsZAs7qKn4vXX
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_74b6b8da4ddb13386db2f42d68529bf5_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-05_74b6b8da4ddb13386db2f42d68529bf5_floxif_mafia.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-05_74b6b8da4ddb13386db2f42d68529bf5_floxif_mafia
-
Size
3.4MB
-
MD5
74b6b8da4ddb13386db2f42d68529bf5
-
SHA1
885ad6a1884f03b23a44078b187b2bc0a42e3415
-
SHA256
5c47bb2065ca1d9882ca3b7ea6f48ee9c374406bf625dc550248d4d0c8cbdf29
-
SHA512
c360a6e20c315aa2a47bd87a231ebbc03587809acc15375c0f4b3e84bc17ca8dbb64f19f1526390b6d7532f96065f4b911fda07e88b4a4b3100b1a96bb78dfc5
-
SSDEEP
98304:vQIQ7n4g8L1ZRER+7b6MYkjMhGs7qKnX341lfc4X:II9g8RTsZAs7qKn4vXX
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-