General
-
Target
2024-12-12_8a2a1a6e8a25ff7b40991b933c004689_floxif_mafia
-
Size
2.4MB
-
Sample
241212-asl2sstpax
-
MD5
8a2a1a6e8a25ff7b40991b933c004689
-
SHA1
7eb52261b9a2422829aeef7ea3af8537ec1f13d2
-
SHA256
0b1796c4940d9a375e2c6523139ce0263809d13f99f618c7ceca4caa24e62867
-
SHA512
89f54f28b5897b3454e18866e20227609e006ecbc291e6ffc03f50c6c374ce7bab5ad8934a7a0f4a4c2d1bda5c39f4a49f3fc92b246d18916b2481b0ebd90f2b
-
SSDEEP
49152:2vuE7A0qIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qV:nE7APrlyutLxC3sEwwM3UV
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-12_8a2a1a6e8a25ff7b40991b933c004689_floxif_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2024-12-12_8a2a1a6e8a25ff7b40991b933c004689_floxif_mafia
-
Size
2.4MB
-
MD5
8a2a1a6e8a25ff7b40991b933c004689
-
SHA1
7eb52261b9a2422829aeef7ea3af8537ec1f13d2
-
SHA256
0b1796c4940d9a375e2c6523139ce0263809d13f99f618c7ceca4caa24e62867
-
SHA512
89f54f28b5897b3454e18866e20227609e006ecbc291e6ffc03f50c6c374ce7bab5ad8934a7a0f4a4c2d1bda5c39f4a49f3fc92b246d18916b2481b0ebd90f2b
-
SSDEEP
49152:2vuE7A0qIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qV:nE7APrlyutLxC3sEwwM3UV
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-