General
-
Target
2024-12-15_d10fc57601e9410f1c34be076ffc9297_floxif_mafia
-
Size
2.0MB
-
Sample
241215-b16a3ssker
-
MD5
d10fc57601e9410f1c34be076ffc9297
-
SHA1
e910a593fbfdaf875f54448684329e0864f8286e
-
SHA256
a487050796b8b9e5cf2c690218a829537d15ead8df9551a486bed5449b52b36e
-
SHA512
9ff6892eba8611d4115ade23887d804841637fc392c117cd1a794f27324115a6c92fd7eb859689966e3549c40d335711a27e77e0834f825bd30c0783827196e0
-
SSDEEP
49152:v1LGMMeYvW26uIwXDPLD4TQ+kjCG9n5gtyvkBT/Wz4HT38jNLQmcZru5IciM:v1LGMMeYvIu5DPLD4TQ+kj95g0vkBT/W
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_d10fc57601e9410f1c34be076ffc9297_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-15_d10fc57601e9410f1c34be076ffc9297_floxif_mafia
-
Size
2.0MB
-
MD5
d10fc57601e9410f1c34be076ffc9297
-
SHA1
e910a593fbfdaf875f54448684329e0864f8286e
-
SHA256
a487050796b8b9e5cf2c690218a829537d15ead8df9551a486bed5449b52b36e
-
SHA512
9ff6892eba8611d4115ade23887d804841637fc392c117cd1a794f27324115a6c92fd7eb859689966e3549c40d335711a27e77e0834f825bd30c0783827196e0
-
SSDEEP
49152:v1LGMMeYvW26uIwXDPLD4TQ+kjCG9n5gtyvkBT/Wz4HT38jNLQmcZru5IciM:v1LGMMeYvIu5DPLD4TQ+kj95g0vkBT/W
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-