General
-
Target
2025-01-01_79f29c022a356b35f79b52994506a3aa_floxif_mafia
-
Size
3.5MB
-
Sample
250101-pj6geavjew
-
MD5
79f29c022a356b35f79b52994506a3aa
-
SHA1
22ecc4ffa4a51edf9bede9cfd3d1790a8f815a7f
-
SHA256
6e7dd38a86f37891b28fbed068a30eb3b531768ba0de568a2839dae833d82e04
-
SHA512
f9b54781668a2a6a78bb4bdd851b33bc9c482588a7685dd9fd1c838322cbbff5d8da577261465ff0cb371f2833d8a11158ded2705b2e333d0d4919e53d6183bd
-
SSDEEP
98304:etgQmjw86xG1wiO225Xvp+gc5mZGgdSBYYigx1wGMv3BE9yM:0gQip5adUI22Hv3BE9r
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-01_79f29c022a356b35f79b52994506a3aa_floxif_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2025-01-01_79f29c022a356b35f79b52994506a3aa_floxif_mafia
-
Size
3.5MB
-
MD5
79f29c022a356b35f79b52994506a3aa
-
SHA1
22ecc4ffa4a51edf9bede9cfd3d1790a8f815a7f
-
SHA256
6e7dd38a86f37891b28fbed068a30eb3b531768ba0de568a2839dae833d82e04
-
SHA512
f9b54781668a2a6a78bb4bdd851b33bc9c482588a7685dd9fd1c838322cbbff5d8da577261465ff0cb371f2833d8a11158ded2705b2e333d0d4919e53d6183bd
-
SSDEEP
98304:etgQmjw86xG1wiO225Xvp+gc5mZGgdSBYYigx1wGMv3BE9yM:0gQip5adUI22Hv3BE9r
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-