General
-
Target
2024-09-28_1960e3dffb2a860d5574f7bdb15a15bd_floxif_mafia
-
Size
346KB
-
Sample
240928-sraw9asejn
-
MD5
1960e3dffb2a860d5574f7bdb15a15bd
-
SHA1
4731100aaa5474b6bd57068d37543a2b2d17c21a
-
SHA256
3901b8c7d1cc99cf05538bf27d1b2afafdd1cb21ea106fed0d783dc39a75d1c0
-
SHA512
1b90d808b5bbb033eccd2f010667f28334423322776442146bcc9bd7c3183ab8e4cd0dbb563c40acb432c59e50a6736e740661545678a834b2dd2f84e559013a
-
SSDEEP
6144:WRhcgGet517K4+Ay6EtA5amS/zmIAkWU/jpIB3nWHpGBV+UdvrEFp7hK1s:KGav77+y11+zmIAtU/jpIBMMBjvrEH71
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-28_1960e3dffb2a860d5574f7bdb15a15bd_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-09-28_1960e3dffb2a860d5574f7bdb15a15bd_floxif_mafia
-
Size
346KB
-
MD5
1960e3dffb2a860d5574f7bdb15a15bd
-
SHA1
4731100aaa5474b6bd57068d37543a2b2d17c21a
-
SHA256
3901b8c7d1cc99cf05538bf27d1b2afafdd1cb21ea106fed0d783dc39a75d1c0
-
SHA512
1b90d808b5bbb033eccd2f010667f28334423322776442146bcc9bd7c3183ab8e4cd0dbb563c40acb432c59e50a6736e740661545678a834b2dd2f84e559013a
-
SSDEEP
6144:WRhcgGet517K4+Ay6EtA5amS/zmIAkWU/jpIB3nWHpGBV+UdvrEFp7hK1s:KGav77+y11+zmIAtU/jpIBMMBjvrEH71
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-