General
-
Target
2025-01-04_0957040449fd45eb0cb04ad0abd55f49_floxif_mafia
-
Size
306KB
-
Sample
250104-pj88asypgy
-
MD5
0957040449fd45eb0cb04ad0abd55f49
-
SHA1
62879dff8068ffda52c59164ad24f7c1e37a4347
-
SHA256
b836c8a0d5def0198309bad4e54bda6e4f0004137e0176236c123b49aea09671
-
SHA512
775c280b2eef5096f116c06a664e8104856781e6e6141697aa163fa17b3c327c5f3a4085fe376bc2cdd3564475431c1d7381c6b429c59611b051fbf4f6b9ab3b
-
SSDEEP
6144:02MNLF0O+gSqWxrAbX1yqNNAQHSYvBV+UdvrEFp7hK1w/GI:0/H0OSqWxsbXgSiYvBjvrEH7kw/GI
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-04_0957040449fd45eb0cb04ad0abd55f49_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-04_0957040449fd45eb0cb04ad0abd55f49_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-04_0957040449fd45eb0cb04ad0abd55f49_floxif_mafia
-
Size
306KB
-
MD5
0957040449fd45eb0cb04ad0abd55f49
-
SHA1
62879dff8068ffda52c59164ad24f7c1e37a4347
-
SHA256
b836c8a0d5def0198309bad4e54bda6e4f0004137e0176236c123b49aea09671
-
SHA512
775c280b2eef5096f116c06a664e8104856781e6e6141697aa163fa17b3c327c5f3a4085fe376bc2cdd3564475431c1d7381c6b429c59611b051fbf4f6b9ab3b
-
SSDEEP
6144:02MNLF0O+gSqWxrAbX1yqNNAQHSYvBV+UdvrEFp7hK1w/GI:0/H0OSqWxsbXgSiYvBjvrEH7kw/GI
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-