General
-
Target
2024-12-30_00af9c1dd43b6c2c70be8cdd106562a3_floxif_mafia
-
Size
512KB
-
Sample
241230-wzwqgavpfw
-
MD5
00af9c1dd43b6c2c70be8cdd106562a3
-
SHA1
7fe5024c0258b3898c352afd20a7e3a9108343a1
-
SHA256
362ec3a2ee30d20092b3113fbdaf9fc84b787d6970c77f0fcdd59fff8ad6dd97
-
SHA512
95caa4146bcbcb062afed25253dd78d41709e4c50fca13c9a7996c10adc1fb2c3a2a0f4cfee7b8e1a2eeb3c489d82771480f1cdb36f760c299f1008c0506f1d1
-
SSDEEP
12288:HKqMmoNiZiJrAkg+eecJPE6nPMzBS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrk:HKqMmodg+eLxE6nP4BeVS2GhK1VqeIAu
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-30_00af9c1dd43b6c2c70be8cdd106562a3_floxif_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-30_00af9c1dd43b6c2c70be8cdd106562a3_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-30_00af9c1dd43b6c2c70be8cdd106562a3_floxif_mafia
-
Size
512KB
-
MD5
00af9c1dd43b6c2c70be8cdd106562a3
-
SHA1
7fe5024c0258b3898c352afd20a7e3a9108343a1
-
SHA256
362ec3a2ee30d20092b3113fbdaf9fc84b787d6970c77f0fcdd59fff8ad6dd97
-
SHA512
95caa4146bcbcb062afed25253dd78d41709e4c50fca13c9a7996c10adc1fb2c3a2a0f4cfee7b8e1a2eeb3c489d82771480f1cdb36f760c299f1008c0506f1d1
-
SSDEEP
12288:HKqMmoNiZiJrAkg+eecJPE6nPMzBS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrk:HKqMmodg+eLxE6nP4BeVS2GhK1VqeIAu
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-