General
-
Target
2024-12-15_d7155574b879ab9aedaee1a80acd298c_floxif_mafia
-
Size
2.4MB
-
Sample
241215-bw3dmazpdv
-
MD5
d7155574b879ab9aedaee1a80acd298c
-
SHA1
30a956397f925b49571ccf5e149cf277414ef0be
-
SHA256
18840f49e6f09525f2d42fd0e5dddcc21045a23948d84d1d12b3d0cf8f54e344
-
SHA512
bc910486f2334e904b227e8c7317c8e0ae78013d111f2f7318ebe238b5f2a63eb065dc2928a99475d9d5ca64a3be8c34f9b597f2e87979232d6fd10bec1b9ab3
-
SSDEEP
49152:TLuE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qE:+E7AfrlyutLxC3sEwwM3UE
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_d7155574b879ab9aedaee1a80acd298c_floxif_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2024-12-15_d7155574b879ab9aedaee1a80acd298c_floxif_mafia
-
Size
2.4MB
-
MD5
d7155574b879ab9aedaee1a80acd298c
-
SHA1
30a956397f925b49571ccf5e149cf277414ef0be
-
SHA256
18840f49e6f09525f2d42fd0e5dddcc21045a23948d84d1d12b3d0cf8f54e344
-
SHA512
bc910486f2334e904b227e8c7317c8e0ae78013d111f2f7318ebe238b5f2a63eb065dc2928a99475d9d5ca64a3be8c34f9b597f2e87979232d6fd10bec1b9ab3
-
SSDEEP
49152:TLuE7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qE:+E7AfrlyutLxC3sEwwM3UE
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-