General
-
Target
2024-12-25_ec50a6c577c518ffa82f6b1463e10d55_floxif_mafia
-
Size
1.9MB
-
Sample
241225-ppk3nasrdj
-
MD5
ec50a6c577c518ffa82f6b1463e10d55
-
SHA1
5334dd30725791ffc96adb1aefba0bbfd7f64e0a
-
SHA256
99d3a1440720ea691b3c6539fd8f371b096edbd8a2f8e45ae247f2f026e31126
-
SHA512
af66210ec1fe5426ece82064b01ad4fbfabfd1a3c8ff363ad703b5907e42c52b73ea89fc3cc09bb54b3e17bf8bc398984589e6c60952e42b948a8a6e20822917
-
SSDEEP
49152:OeLjveDKVx+KJtOw8RG48pI5PCzcs7dGyayEFD5uLD9RJ4KvJFBVAX69FPfZ:rLeKOKTOw898q56zcs7dGyayEWLD9HvX
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_ec50a6c577c518ffa82f6b1463e10d55_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-25_ec50a6c577c518ffa82f6b1463e10d55_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-25_ec50a6c577c518ffa82f6b1463e10d55_floxif_mafia
-
Size
1.9MB
-
MD5
ec50a6c577c518ffa82f6b1463e10d55
-
SHA1
5334dd30725791ffc96adb1aefba0bbfd7f64e0a
-
SHA256
99d3a1440720ea691b3c6539fd8f371b096edbd8a2f8e45ae247f2f026e31126
-
SHA512
af66210ec1fe5426ece82064b01ad4fbfabfd1a3c8ff363ad703b5907e42c52b73ea89fc3cc09bb54b3e17bf8bc398984589e6c60952e42b948a8a6e20822917
-
SSDEEP
49152:OeLjveDKVx+KJtOw8RG48pI5PCzcs7dGyayEFD5uLD9RJ4KvJFBVAX69FPfZ:rLeKOKTOw898q56zcs7dGyayEWLD9HvX
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-