General
-
Target
2024-09-13_c004f67259730fa72b40c3d54a1521be_floxif_mafia
-
Size
2.5MB
-
Sample
240913-q1fgzstbkc
-
MD5
c004f67259730fa72b40c3d54a1521be
-
SHA1
e6fc944aaec26df28503e938f45b77b28589895c
-
SHA256
3b3526b2ec4d92e4c90f567aed0e932efd21a787f0e87ee0f4e19d9069d5f5cd
-
SHA512
2b3d915f217ec1f386ca9f9ffc3a362661fb23f49013bf8e07bd4a6c16df7e8b0a639a684d3f35e0031f2311111daa0cdcb9d7fd23b93b93fd0267b9d10cad4d
-
SSDEEP
49152:DuIIKeofs2hPd2l177BTK2VbDsar1YDjD:DjLfs2hPIl1/s
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_c004f67259730fa72b40c3d54a1521be_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-09-13_c004f67259730fa72b40c3d54a1521be_floxif_mafia
-
Size
2.5MB
-
MD5
c004f67259730fa72b40c3d54a1521be
-
SHA1
e6fc944aaec26df28503e938f45b77b28589895c
-
SHA256
3b3526b2ec4d92e4c90f567aed0e932efd21a787f0e87ee0f4e19d9069d5f5cd
-
SHA512
2b3d915f217ec1f386ca9f9ffc3a362661fb23f49013bf8e07bd4a6c16df7e8b0a639a684d3f35e0031f2311111daa0cdcb9d7fd23b93b93fd0267b9d10cad4d
-
SSDEEP
49152:DuIIKeofs2hPd2l177BTK2VbDsar1YDjD:DjLfs2hPIl1/s
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-