General
-
Target
2024-09-13_12cc44ed02a82002775bbef8ea6c854f_floxif_mafia
-
Size
1.9MB
-
Sample
240913-psaq4a1gka
-
MD5
12cc44ed02a82002775bbef8ea6c854f
-
SHA1
5a1bacc8e78dc5ca7de1c5f4a48d08bfa40791e0
-
SHA256
85c2bc15f52bcba4ed42a78119d414c2b526454c8bdab938dafb3ebf75391e25
-
SHA512
194fec65ff5660a80a255256324d9c991ae9bd71dd87324b16900bb9ce02b20a2921100e4ceea370412c43e4bc3a48d9cabb96d13dffc9d6531602efc0db6ac0
-
SSDEEP
49152:WWPTW3vYptbUE0QI662K8E11Jkc/ookTD79C6A4tVxckwDXs:rptbUE0Qw2K51Jkc/ooYk45xj
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_12cc44ed02a82002775bbef8ea6c854f_floxif_mafia.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-13_12cc44ed02a82002775bbef8ea6c854f_floxif_mafia.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
2024-09-13_12cc44ed02a82002775bbef8ea6c854f_floxif_mafia
-
Size
1.9MB
-
MD5
12cc44ed02a82002775bbef8ea6c854f
-
SHA1
5a1bacc8e78dc5ca7de1c5f4a48d08bfa40791e0
-
SHA256
85c2bc15f52bcba4ed42a78119d414c2b526454c8bdab938dafb3ebf75391e25
-
SHA512
194fec65ff5660a80a255256324d9c991ae9bd71dd87324b16900bb9ce02b20a2921100e4ceea370412c43e4bc3a48d9cabb96d13dffc9d6531602efc0db6ac0
-
SSDEEP
49152:WWPTW3vYptbUE0QI662K8E11Jkc/ookTD79C6A4tVxckwDXs:rptbUE0Qw2K51Jkc/ooYk45xj
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-