General
-
Target
2024-12-28_7cdf75a683aa467119eb73bb796a2f78_floxif_mafia
-
Size
2.5MB
-
Sample
241228-pnt9yaxqhy
-
MD5
7cdf75a683aa467119eb73bb796a2f78
-
SHA1
6a34303c3b3cf6a7266ba0d8611e173acc52ec6d
-
SHA256
a1192cd8bd5802387cf650ca41b174b5f6bd4e1e455ad51eaec86f585ac0cf36
-
SHA512
6422848f643a588cbec6835b9a37d10c8e1de4487cd35d3e3e5a7b7cddc8a1813de6efd78f8d3e013e2000968ab0d382342fea20f3dd8002dc7f9658f0c8ca27
-
SSDEEP
49152:1uIIKcofs2hPd2l177BTK2VbDsar1YDjs:1jZfs2hPIl1/v
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-28_7cdf75a683aa467119eb73bb796a2f78_floxif_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-28_7cdf75a683aa467119eb73bb796a2f78_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-28_7cdf75a683aa467119eb73bb796a2f78_floxif_mafia
-
Size
2.5MB
-
MD5
7cdf75a683aa467119eb73bb796a2f78
-
SHA1
6a34303c3b3cf6a7266ba0d8611e173acc52ec6d
-
SHA256
a1192cd8bd5802387cf650ca41b174b5f6bd4e1e455ad51eaec86f585ac0cf36
-
SHA512
6422848f643a588cbec6835b9a37d10c8e1de4487cd35d3e3e5a7b7cddc8a1813de6efd78f8d3e013e2000968ab0d382342fea20f3dd8002dc7f9658f0c8ca27
-
SSDEEP
49152:1uIIKcofs2hPd2l177BTK2VbDsar1YDjs:1jZfs2hPIl1/v
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-