General
-
Target
2024-12-11_52898bad8f0844fe678e52f661da1426_floxif_mafia
-
Size
2.5MB
-
Sample
241211-pnbgtssmfx
-
MD5
52898bad8f0844fe678e52f661da1426
-
SHA1
c19c922554c2c26cfbe4aa1db7ac4b203b70d57b
-
SHA256
703b2a3b28fd86c05e963073985c6c98f79cfa19b361328d23a03b3d95e2b29e
-
SHA512
7c997586a7c40ce488e6c33f40d2b26e6fa3f08e187151116912d1d6f64914eccc5cab77a4b8ff927f5076e9be240f074c43b9474495805fe79fe16a43cc555d
-
SSDEEP
49152:tuIIjKofs2hPd2l177BTK2VbDsar1YDjh:tjwfs2hPIl1/e
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-11_52898bad8f0844fe678e52f661da1426_floxif_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2024-12-11_52898bad8f0844fe678e52f661da1426_floxif_mafia
-
Size
2.5MB
-
MD5
52898bad8f0844fe678e52f661da1426
-
SHA1
c19c922554c2c26cfbe4aa1db7ac4b203b70d57b
-
SHA256
703b2a3b28fd86c05e963073985c6c98f79cfa19b361328d23a03b3d95e2b29e
-
SHA512
7c997586a7c40ce488e6c33f40d2b26e6fa3f08e187151116912d1d6f64914eccc5cab77a4b8ff927f5076e9be240f074c43b9474495805fe79fe16a43cc555d
-
SSDEEP
49152:tuIIjKofs2hPd2l177BTK2VbDsar1YDjh:tjwfs2hPIl1/e
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-