General
-
Target
2024-09-13_527292900db9327c48d9cfb89a76359f_floxif_mafia
-
Size
4.3MB
-
Sample
240913-p54vpssbqc
-
MD5
527292900db9327c48d9cfb89a76359f
-
SHA1
e623b248b1ab6f3181742e91f0343de2613ee298
-
SHA256
88ee1ae11231d3b021955b95cb732fcb5cdeee3616f77904db7f0ee162f773df
-
SHA512
e04c25b73fa7c317358ad61b5d95ade1ceeb7310eda3d171a3beedc90df4610de1b7033b295ce95d438710a04854e8a52f66235d7fbb809f9127ad0eeb82ef75
-
SSDEEP
98304:MrpPmiQrGRSTSjn81JV8r+2wO9Mbb1+WcJhWkD6j6q8oyUdLcgD5j3q:i7gO41pC06q8oyUfja
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_527292900db9327c48d9cfb89a76359f_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-09-13_527292900db9327c48d9cfb89a76359f_floxif_mafia
-
Size
4.3MB
-
MD5
527292900db9327c48d9cfb89a76359f
-
SHA1
e623b248b1ab6f3181742e91f0343de2613ee298
-
SHA256
88ee1ae11231d3b021955b95cb732fcb5cdeee3616f77904db7f0ee162f773df
-
SHA512
e04c25b73fa7c317358ad61b5d95ade1ceeb7310eda3d171a3beedc90df4610de1b7033b295ce95d438710a04854e8a52f66235d7fbb809f9127ad0eeb82ef75
-
SSDEEP
98304:MrpPmiQrGRSTSjn81JV8r+2wO9Mbb1+WcJhWkD6j6q8oyUdLcgD5j3q:i7gO41pC06q8oyUfja
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-