General
-
Target
2024-09-05_d450dd75bc2472d10269e42c43258fbb_floxif_mafia
-
Size
3.4MB
-
Sample
240905-qse69a1hqq
-
MD5
d450dd75bc2472d10269e42c43258fbb
-
SHA1
2423178e846f7062d03c4380316e8a583f9ab982
-
SHA256
aec630e0b13f8080d424fa7e2d7aa5bd106a0b186ab7eb29c2b8f4b51a623773
-
SHA512
14ac74f2ca66e6f28bb48d38e29ca3df083407b47fba7be7ab179264476ffeeae584940b9770a9f2b1f8629756d31e6937890b60c873c4cd668dc81a87eab03b
-
SSDEEP
98304:vQIQ7n4g8zR1ZRER+vb6MYkjMtGs7qKnX341lfc4o:II9g8rPsZss7qKn4vXo
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_d450dd75bc2472d10269e42c43258fbb_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-09-05_d450dd75bc2472d10269e42c43258fbb_floxif_mafia
-
Size
3.4MB
-
MD5
d450dd75bc2472d10269e42c43258fbb
-
SHA1
2423178e846f7062d03c4380316e8a583f9ab982
-
SHA256
aec630e0b13f8080d424fa7e2d7aa5bd106a0b186ab7eb29c2b8f4b51a623773
-
SHA512
14ac74f2ca66e6f28bb48d38e29ca3df083407b47fba7be7ab179264476ffeeae584940b9770a9f2b1f8629756d31e6937890b60c873c4cd668dc81a87eab03b
-
SSDEEP
98304:vQIQ7n4g8zR1ZRER+vb6MYkjMtGs7qKnX341lfc4o:II9g8rPsZss7qKn4vXo
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-