General
-
Target
2024-09-13_374c1e496b5da6d679cd7a0fbbf285f8_floxif_mafia
-
Size
2.5MB
-
Sample
240913-p1n9fssamb
-
MD5
374c1e496b5da6d679cd7a0fbbf285f8
-
SHA1
f93db0279074d135eeaa52f261b5ed68728363be
-
SHA256
9de54f034df053215a5e6045f485362837069f6561a0942b8c6c498fae34d1f3
-
SHA512
a2772d62ae590d7ab1765309180cfd8d866cb22b943b78994fc1fd878ca9bea2c492fe27cb031858464c7e6ea5ad5c1cb3b24fa5aad24b4d9d36791b82d8d8dc
-
SSDEEP
49152:suIIKgofs2hPd2l177BTK2VbDsar1YDjW:sj9fs2hPIl1/N
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_374c1e496b5da6d679cd7a0fbbf285f8_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-09-13_374c1e496b5da6d679cd7a0fbbf285f8_floxif_mafia
-
Size
2.5MB
-
MD5
374c1e496b5da6d679cd7a0fbbf285f8
-
SHA1
f93db0279074d135eeaa52f261b5ed68728363be
-
SHA256
9de54f034df053215a5e6045f485362837069f6561a0942b8c6c498fae34d1f3
-
SHA512
a2772d62ae590d7ab1765309180cfd8d866cb22b943b78994fc1fd878ca9bea2c492fe27cb031858464c7e6ea5ad5c1cb3b24fa5aad24b4d9d36791b82d8d8dc
-
SSDEEP
49152:suIIKgofs2hPd2l177BTK2VbDsar1YDjW:sj9fs2hPIl1/N
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-