General
-
Target
2024-12-25_a019c6eefa874c70c9e57732d3b106d4_floxif_mafia
-
Size
2.5MB
-
Sample
241225-pmt8jsspe1
-
MD5
a019c6eefa874c70c9e57732d3b106d4
-
SHA1
b77f10186db8642587a027d70eb25da416650acc
-
SHA256
66412b2641e8de0827ae54e0d583be17a1b75055a353dd2805232774b9d07794
-
SHA512
b75dad17b96fa97279ae782a0e114bed0d68fd88a2d8b9c4a5db8d9feb4de68cf50ad82ca382d1ca4f4a4e0148fd41b0fd473ea9d0d08646f4ac708d48f775af
-
SSDEEP
49152:tuI9Kwofs2hPd2l177BTK2VbDsar1YDjH:tjCfs2hPIl1/Y
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_a019c6eefa874c70c9e57732d3b106d4_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-25_a019c6eefa874c70c9e57732d3b106d4_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-25_a019c6eefa874c70c9e57732d3b106d4_floxif_mafia
-
Size
2.5MB
-
MD5
a019c6eefa874c70c9e57732d3b106d4
-
SHA1
b77f10186db8642587a027d70eb25da416650acc
-
SHA256
66412b2641e8de0827ae54e0d583be17a1b75055a353dd2805232774b9d07794
-
SHA512
b75dad17b96fa97279ae782a0e114bed0d68fd88a2d8b9c4a5db8d9feb4de68cf50ad82ca382d1ca4f4a4e0148fd41b0fd473ea9d0d08646f4ac708d48f775af
-
SSDEEP
49152:tuI9Kwofs2hPd2l177BTK2VbDsar1YDjH:tjCfs2hPIl1/Y
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-