General
-
Target
2024-12-10_78f19ebb268c79a6b5dd2ab2791e082e_floxif_mafia
-
Size
272KB
-
Sample
241210-b6fbvayqdw
-
MD5
78f19ebb268c79a6b5dd2ab2791e082e
-
SHA1
adf0c302213ac2e5363c304dd75735a4ed1334cf
-
SHA256
6ae23bcc02f4bb2b2d66cda9a0760296d8f11e2b3a72a5144c54a72476bdcb5d
-
SHA512
30f86f33698d5b80fbfeffea7bacd69cc723f0b255a1800bdaac4ec11271dbab38cad93e53e32939d0cb942693c39f277c5993c7249b6d18242b26016912ebeb
-
SSDEEP
6144:2UHNlyIxgMgDRkTEUET+l2AbpLk0cusQvMRlkM4RD/qzMfU/:PtlakT1KG2qk0nMRGM4h/qofi
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-10_78f19ebb268c79a6b5dd2ab2791e082e_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-10_78f19ebb268c79a6b5dd2ab2791e082e_floxif_mafia
-
Size
272KB
-
MD5
78f19ebb268c79a6b5dd2ab2791e082e
-
SHA1
adf0c302213ac2e5363c304dd75735a4ed1334cf
-
SHA256
6ae23bcc02f4bb2b2d66cda9a0760296d8f11e2b3a72a5144c54a72476bdcb5d
-
SHA512
30f86f33698d5b80fbfeffea7bacd69cc723f0b255a1800bdaac4ec11271dbab38cad93e53e32939d0cb942693c39f277c5993c7249b6d18242b26016912ebeb
-
SSDEEP
6144:2UHNlyIxgMgDRkTEUET+l2AbpLk0cusQvMRlkM4RD/qzMfU/:PtlakT1KG2qk0nMRGM4h/qofi
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-