General
-
Target
2024-12-31_e1ff4880c402b6dc192c8b993ebb0db8_floxif_mafia
-
Size
512KB
-
Sample
241231-gafwdszpds
-
MD5
e1ff4880c402b6dc192c8b993ebb0db8
-
SHA1
5caa573b29bf620d258fbfc2e5d0419a326f55e8
-
SHA256
5b52b4899ab31c833ae18dbca5d0b09cb12a057c2ab04eb69ada3add865b73d9
-
SHA512
d34a9f39fab7d59c10680842b663fc8ccce73b57d5d1b8886c5593c5505066a6a5fe0ebca20bdf5d23681dcc1c20d0a6bae6af67e5ab6f4658af28b95cca290d
-
SSDEEP
12288:HKqMmoNiZiJrAkg+eecZE6nPMz0zS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrs:HKqMmodg+eLZE6nP4ieVS2GhK1VqeIAC
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-31_e1ff4880c402b6dc192c8b993ebb0db8_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-31_e1ff4880c402b6dc192c8b993ebb0db8_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-31_e1ff4880c402b6dc192c8b993ebb0db8_floxif_mafia
-
Size
512KB
-
MD5
e1ff4880c402b6dc192c8b993ebb0db8
-
SHA1
5caa573b29bf620d258fbfc2e5d0419a326f55e8
-
SHA256
5b52b4899ab31c833ae18dbca5d0b09cb12a057c2ab04eb69ada3add865b73d9
-
SHA512
d34a9f39fab7d59c10680842b663fc8ccce73b57d5d1b8886c5593c5505066a6a5fe0ebca20bdf5d23681dcc1c20d0a6bae6af67e5ab6f4658af28b95cca290d
-
SSDEEP
12288:HKqMmoNiZiJrAkg+eecZE6nPMz0zS5VnDwvFNFSXGhK1VqejEdkGE2azATABjvrs:HKqMmodg+eLZE6nP4ieVS2GhK1VqeIAC
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-