General
-
Target
2024-12-11_2873cf0683d3dc2cb12080ba3a06f3db_floxif_mafia
-
Size
3.9MB
-
Sample
241211-j81dssyrbm
-
MD5
2873cf0683d3dc2cb12080ba3a06f3db
-
SHA1
1e6bd08c68e31dd8df7bea351fe32779dbbfb6b9
-
SHA256
2048be9cd405774b9c20cecfa9e7c722494d6970862d79cb27a032f82bfd304e
-
SHA512
2a1a9d8612ea4b84a41bb21265104f101ec40ca2a6dafe5c9eab8a2206326b397156906f9b1d4a1cea8af97cf9c9b237541732341e6de58b9f00fba3e5633c7b
-
SSDEEP
98304:1g+ESjoa9kZ6DRwcEtzCyQWuYLgqQ/Pn9rj+De0nzQUya:1g+ESJ9k6bOuWgtn9rj+DoUR
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-11_2873cf0683d3dc2cb12080ba3a06f3db_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-12-11_2873cf0683d3dc2cb12080ba3a06f3db_floxif_mafia
-
Size
3.9MB
-
MD5
2873cf0683d3dc2cb12080ba3a06f3db
-
SHA1
1e6bd08c68e31dd8df7bea351fe32779dbbfb6b9
-
SHA256
2048be9cd405774b9c20cecfa9e7c722494d6970862d79cb27a032f82bfd304e
-
SHA512
2a1a9d8612ea4b84a41bb21265104f101ec40ca2a6dafe5c9eab8a2206326b397156906f9b1d4a1cea8af97cf9c9b237541732341e6de58b9f00fba3e5633c7b
-
SSDEEP
98304:1g+ESjoa9kZ6DRwcEtzCyQWuYLgqQ/Pn9rj+De0nzQUya:1g+ESJ9k6bOuWgtn9rj+DoUR
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-