General
-
Target
2024-09-09_6758195e8fa7658b399bdbf987fb4873_floxif_mafia
-
Size
2.0MB
-
Sample
240909-blzjzsvbrl
-
MD5
6758195e8fa7658b399bdbf987fb4873
-
SHA1
117b8806ea4377acedfaaf60dcdc14f2f877df14
-
SHA256
4ef9e728362b40c29c89a5ec1ff4cfbb01d8d4a6c1bf388efd409f1dbe22199b
-
SHA512
46e77bd1111d9eaa3dfa288317bab4f3bb196ae9efa751e1583cf323813be08cfa52794e72213ac46d99c5fc8887315813a5b81b41f6dd7d08de37137797c016
-
SSDEEP
49152:s1LGMMeYPg4m6hbzH6iRsNF5SroQntL4sm/w94A/2s3GW0ghLrRufu7VPKcgO4:s1LGMMeYPXhaiGNF5SroQsT/w94A/2sa
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-09_6758195e8fa7658b399bdbf987fb4873_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-09-09_6758195e8fa7658b399bdbf987fb4873_floxif_mafia
-
Size
2.0MB
-
MD5
6758195e8fa7658b399bdbf987fb4873
-
SHA1
117b8806ea4377acedfaaf60dcdc14f2f877df14
-
SHA256
4ef9e728362b40c29c89a5ec1ff4cfbb01d8d4a6c1bf388efd409f1dbe22199b
-
SHA512
46e77bd1111d9eaa3dfa288317bab4f3bb196ae9efa751e1583cf323813be08cfa52794e72213ac46d99c5fc8887315813a5b81b41f6dd7d08de37137797c016
-
SSDEEP
49152:s1LGMMeYPg4m6hbzH6iRsNF5SroQntL4sm/w94A/2s3GW0ghLrRufu7VPKcgO4:s1LGMMeYPXhaiGNF5SroQsT/w94A/2sa
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-