General
-
Target
2024-09-13_9b6fefe7d02e65fe8f6d5d3ea77c6ccc_floxif_mafia
-
Size
2.5MB
-
Sample
240913-qxm3nasern
-
MD5
9b6fefe7d02e65fe8f6d5d3ea77c6ccc
-
SHA1
0572728234572764ec942907075340297573d959
-
SHA256
12df5e552088d5b5eef4ea8cfdaea756b70f0c34c528df70dea977b6eb0e9b33
-
SHA512
de6f21f89d2b5dde09ca8ddf2e4973d3a3fc89b8556c71855270243b3e7fce762cfaadd97d2f44d7235d45d795273d9f7bf78645709619548d4e368da1afb084
-
SSDEEP
49152:CuIIKjofs2hPd2l177BTK2VbDsar1YDj5:Cjmfs2hPIl1/G
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_9b6fefe7d02e65fe8f6d5d3ea77c6ccc_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-09-13_9b6fefe7d02e65fe8f6d5d3ea77c6ccc_floxif_mafia
-
Size
2.5MB
-
MD5
9b6fefe7d02e65fe8f6d5d3ea77c6ccc
-
SHA1
0572728234572764ec942907075340297573d959
-
SHA256
12df5e552088d5b5eef4ea8cfdaea756b70f0c34c528df70dea977b6eb0e9b33
-
SHA512
de6f21f89d2b5dde09ca8ddf2e4973d3a3fc89b8556c71855270243b3e7fce762cfaadd97d2f44d7235d45d795273d9f7bf78645709619548d4e368da1afb084
-
SSDEEP
49152:CuIIKjofs2hPd2l177BTK2VbDsar1YDj5:Cjmfs2hPIl1/G
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-