General
-
Target
2024-10-14_b47c46c27211628941ac56bce8dabee1_floxif_mafia
-
Size
1.9MB
-
Sample
241014-q7pn8ssfnk
-
MD5
b47c46c27211628941ac56bce8dabee1
-
SHA1
b752c2a05786ff2726435d5863bf7e9d65b9295c
-
SHA256
ac4a46960b4dcedc35cd767a914733b8ec09d0732a0cbe5bd6249aef5f98ca29
-
SHA512
74def5bad505478a4f889ff9beda5f9855bb7948a513f21a08659b2f49e0bde3519276026d9ca1ca4227447da4908367577330a0e403e0e95a222255dd9a9757
-
SSDEEP
49152:+WBQz60wsU+6Ufr1CJpiTvx5HzIT6LEnFTt/jC6A4tVxM6aO:CO+6UfrspiTrTIT6LEnXa45MO
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_b47c46c27211628941ac56bce8dabee1_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-10-14_b47c46c27211628941ac56bce8dabee1_floxif_mafia
-
Size
1.9MB
-
MD5
b47c46c27211628941ac56bce8dabee1
-
SHA1
b752c2a05786ff2726435d5863bf7e9d65b9295c
-
SHA256
ac4a46960b4dcedc35cd767a914733b8ec09d0732a0cbe5bd6249aef5f98ca29
-
SHA512
74def5bad505478a4f889ff9beda5f9855bb7948a513f21a08659b2f49e0bde3519276026d9ca1ca4227447da4908367577330a0e403e0e95a222255dd9a9757
-
SSDEEP
49152:+WBQz60wsU+6Ufr1CJpiTvx5HzIT6LEnFTt/jC6A4tVxM6aO:CO+6UfrspiTrTIT6LEnXa45MO
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-