General
-
Target
2024-12-28_bbef1927f23fb342ae557c1226b7d7ac_floxif_mafia
-
Size
2.5MB
-
Sample
241228-ppk3naylgm
-
MD5
bbef1927f23fb342ae557c1226b7d7ac
-
SHA1
2dde87a7f280877fc95fdcb2ce011a76fe817c20
-
SHA256
bbdfec325e1138b35ad2f520c411e05fa3e720b6478a6e286c2b4776dc9d9c3a
-
SHA512
d7609dc207cf14d4458ab20be6d68ac317fd06e13c226f995b0b98102f6398395f4901c73e4ce80f35f3c402afabf428676df6eff8b0114d96ebce65d8dd82b5
-
SSDEEP
49152:tuIgKLofs2hPd2l177BTK2VbDsar1YDjJ:tjWfs2hPIl1/2
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-28_bbef1927f23fb342ae557c1226b7d7ac_floxif_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2024-12-28_bbef1927f23fb342ae557c1226b7d7ac_floxif_mafia
-
Size
2.5MB
-
MD5
bbef1927f23fb342ae557c1226b7d7ac
-
SHA1
2dde87a7f280877fc95fdcb2ce011a76fe817c20
-
SHA256
bbdfec325e1138b35ad2f520c411e05fa3e720b6478a6e286c2b4776dc9d9c3a
-
SHA512
d7609dc207cf14d4458ab20be6d68ac317fd06e13c226f995b0b98102f6398395f4901c73e4ce80f35f3c402afabf428676df6eff8b0114d96ebce65d8dd82b5
-
SSDEEP
49152:tuIgKLofs2hPd2l177BTK2VbDsar1YDjJ:tjWfs2hPIl1/2
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-