General
-
Target
2024-10-17_d882edf9617b0f0f522f39b40e6a5de6_floxif_mafia
-
Size
2.5MB
-
Sample
241017-rjzd7stfqn
-
MD5
d882edf9617b0f0f522f39b40e6a5de6
-
SHA1
eaea57cec34f3a0c5dbf18f121a6765d84f60e4c
-
SHA256
b6dce55dc2756b77395bf8799e91b9e6abf2570441bfc2de7875c6f2d0cb929b
-
SHA512
f20bfa2a76b26d3e9a1a2d9f6307913f628a137ec957ca65d5439e043fe31e6bbc1de33ec57d473bbda3d066c4bd9d02f4c14c4905dca82b29f3dc12172b40bf
-
SSDEEP
49152:+uIIKpofs2hPd2l177BTK2VbDsar1YDj6:+jEfs2hPIl1/V
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-17_d882edf9617b0f0f522f39b40e6a5de6_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-10-17_d882edf9617b0f0f522f39b40e6a5de6_floxif_mafia
-
Size
2.5MB
-
MD5
d882edf9617b0f0f522f39b40e6a5de6
-
SHA1
eaea57cec34f3a0c5dbf18f121a6765d84f60e4c
-
SHA256
b6dce55dc2756b77395bf8799e91b9e6abf2570441bfc2de7875c6f2d0cb929b
-
SHA512
f20bfa2a76b26d3e9a1a2d9f6307913f628a137ec957ca65d5439e043fe31e6bbc1de33ec57d473bbda3d066c4bd9d02f4c14c4905dca82b29f3dc12172b40bf
-
SSDEEP
49152:+uIIKpofs2hPd2l177BTK2VbDsar1YDj6:+jEfs2hPIl1/V
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-