General
-
Target
2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia
-
Size
187KB
-
Sample
241222-p5btxszjcm
-
MD5
a1ed8c9a139119f7d68ee5baaff7ae61
-
SHA1
23579b61ed7cd2aaee529fe7ea161fdf5f83b538
-
SHA256
5bee821247b8594b552e8b7a45afd431250dd3a99bb6ecf8dcbb0a86cc5c5010
-
SHA512
b8e612a7cdde1de4d3415054a2c19a98899903a9001005927f38d1c8a16d59e8f58724e6c0c984a21d93fc5881f5b12b584b4123079e3a92bf4f40e0fec1ff83
-
SSDEEP
3072:7sPJu8eUE3QMTFucS9dagcCvkaWe3UIrt85oPatN92lQBV+UdE+rECWp7hK5n:oPJu8nE3QM/gRkaj9tWZBV+UdvrEFp7a
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-22_a1ed8c9a139119f7d68ee5baaff7ae61_floxif_karagany_mafia
-
Size
187KB
-
MD5
a1ed8c9a139119f7d68ee5baaff7ae61
-
SHA1
23579b61ed7cd2aaee529fe7ea161fdf5f83b538
-
SHA256
5bee821247b8594b552e8b7a45afd431250dd3a99bb6ecf8dcbb0a86cc5c5010
-
SHA512
b8e612a7cdde1de4d3415054a2c19a98899903a9001005927f38d1c8a16d59e8f58724e6c0c984a21d93fc5881f5b12b584b4123079e3a92bf4f40e0fec1ff83
-
SSDEEP
3072:7sPJu8eUE3QMTFucS9dagcCvkaWe3UIrt85oPatN92lQBV+UdE+rECWp7hK5n:oPJu8nE3QM/gRkaj9tWZBV+UdvrEFp7a
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-