General
-
Target
2024-12-15_4a277e92684e3e7f2cbc993cc1cc2b62_floxif_mafia
-
Size
2.4MB
-
Sample
241215-bxd3essjfl
-
MD5
4a277e92684e3e7f2cbc993cc1cc2b62
-
SHA1
adf23f1c3ab6fc21dd94bc0e0c0f063786b1c099
-
SHA256
e9dc37cc0d3863b0c3a80bdd0fb3b9b23b2a18d1faf8c874eee9fd953d477516
-
SHA512
507dd17d3843ddcde74ce7fb603dd641655dfef95080071213343ab50ee005c87218216702522756e8bd4711fef6879c2834f0075bf57724fc1f68dcaba247de
-
SSDEEP
49152:2suCkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qm:KCfrlyutLxC3sEwwM3Um
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_4a277e92684e3e7f2cbc993cc1cc2b62_floxif_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-12-15_4a277e92684e3e7f2cbc993cc1cc2b62_floxif_mafia
-
Size
2.4MB
-
MD5
4a277e92684e3e7f2cbc993cc1cc2b62
-
SHA1
adf23f1c3ab6fc21dd94bc0e0c0f063786b1c099
-
SHA256
e9dc37cc0d3863b0c3a80bdd0fb3b9b23b2a18d1faf8c874eee9fd953d477516
-
SHA512
507dd17d3843ddcde74ce7fb603dd641655dfef95080071213343ab50ee005c87218216702522756e8bd4711fef6879c2834f0075bf57724fc1f68dcaba247de
-
SSDEEP
49152:2suCkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qm:KCfrlyutLxC3sEwwM3Um
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-