General
-
Target
2024-11-18_ac212cecf0a0149efc1b6e823302526a_floxif_karagany_mafia
-
Size
201KB
-
Sample
241118-wtnsnssbma
-
MD5
ac212cecf0a0149efc1b6e823302526a
-
SHA1
3d9d5d91af503e01c621bf355f3b0e9319830cb1
-
SHA256
5b5671ca99d86193255b04bfec7ca0e6f96e1a0f41b1bd76a525b3a13288ae08
-
SHA512
41086ff4e110ca4fc40eed622a79ce238d3d54cc1fe0a4dc528b335d02c4e1fbb5372028c817953d2d19fc7fa8656e7dabccdc578a4c234fe58fd57674e5d743
-
SSDEEP
6144:em4XA4bB1AtiOlOZF/pRBV+UdvrEFp7hK81g:em4XnbADlODzBjvrEH7NC
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-18_ac212cecf0a0149efc1b6e823302526a_floxif_karagany_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-11-18_ac212cecf0a0149efc1b6e823302526a_floxif_karagany_mafia
-
Size
201KB
-
MD5
ac212cecf0a0149efc1b6e823302526a
-
SHA1
3d9d5d91af503e01c621bf355f3b0e9319830cb1
-
SHA256
5b5671ca99d86193255b04bfec7ca0e6f96e1a0f41b1bd76a525b3a13288ae08
-
SHA512
41086ff4e110ca4fc40eed622a79ce238d3d54cc1fe0a4dc528b335d02c4e1fbb5372028c817953d2d19fc7fa8656e7dabccdc578a4c234fe58fd57674e5d743
-
SSDEEP
6144:em4XA4bB1AtiOlOZF/pRBV+UdvrEFp7hK81g:em4XnbADlODzBjvrEH7NC
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-