General
-
Target
2024-12-31_dc063bd75e7e140ea142dc8b87023183_floxif_mafia
-
Size
3.4MB
-
Sample
241231-pmne1azngy
-
MD5
dc063bd75e7e140ea142dc8b87023183
-
SHA1
cddc5c32b1b84baa5071ce95be0f132c5e3fc789
-
SHA256
fc2524d329c754b8365e09c50e4f84cc5d672e9755f8ccde42e614c5964c0f65
-
SHA512
81c65d7c7b2b1a706f9d41da103d8eb77a9632644941d2d6ec01ac9442cd7c3a8840f440e4e09eb550add9bf65367a3836056ab1cdb064c9713dd14251b9bd3f
-
SSDEEP
98304:ApSbilaS48FpKjHwxuHJP1kBHFEVK/abYh3gF0zmwtAwuv0:g0HcBuKCOC0zmwXuv0
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-31_dc063bd75e7e140ea142dc8b87023183_floxif_mafia.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2024-12-31_dc063bd75e7e140ea142dc8b87023183_floxif_mafia
-
Size
3.4MB
-
MD5
dc063bd75e7e140ea142dc8b87023183
-
SHA1
cddc5c32b1b84baa5071ce95be0f132c5e3fc789
-
SHA256
fc2524d329c754b8365e09c50e4f84cc5d672e9755f8ccde42e614c5964c0f65
-
SHA512
81c65d7c7b2b1a706f9d41da103d8eb77a9632644941d2d6ec01ac9442cd7c3a8840f440e4e09eb550add9bf65367a3836056ab1cdb064c9713dd14251b9bd3f
-
SSDEEP
98304:ApSbilaS48FpKjHwxuHJP1kBHFEVK/abYh3gF0zmwtAwuv0:g0HcBuKCOC0zmwXuv0
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-