General
-
Target
2024-11-23_55d0dadc4feb5873b80d1a61d7a8c622_floxif_mafia
-
Size
268KB
-
Sample
241123-lcrg5aynbm
-
MD5
55d0dadc4feb5873b80d1a61d7a8c622
-
SHA1
afff011f61f629d240865389298f60465384f468
-
SHA256
ed4e3a26d49cfdfce3c734d35bead1aef612614c1ec6ab7ce4110d936ec2e43c
-
SHA512
1f3162c2dbf1bf040549986d256ba36c835bf8ab5aa22536cd50ae31a1c4385f1aac5412d935b2752be039ccdddb302f2e0e03edf192de67aca5a83abe0a2ce1
-
SSDEEP
6144:n147gBGl86ggtZEvDQ9u7JaSBV+UdvrEFp7hKcR0:nmIGBggtZEvDQwJnBjvrEH7/R0
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-23_55d0dadc4feb5873b80d1a61d7a8c622_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-11-23_55d0dadc4feb5873b80d1a61d7a8c622_floxif_mafia
-
Size
268KB
-
MD5
55d0dadc4feb5873b80d1a61d7a8c622
-
SHA1
afff011f61f629d240865389298f60465384f468
-
SHA256
ed4e3a26d49cfdfce3c734d35bead1aef612614c1ec6ab7ce4110d936ec2e43c
-
SHA512
1f3162c2dbf1bf040549986d256ba36c835bf8ab5aa22536cd50ae31a1c4385f1aac5412d935b2752be039ccdddb302f2e0e03edf192de67aca5a83abe0a2ce1
-
SSDEEP
6144:n147gBGl86ggtZEvDQ9u7JaSBV+UdvrEFp7hKcR0:nmIGBggtZEvDQwJnBjvrEH7/R0
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-