General
-
Target
2025-01-05_7483be8126da1f9f54081abba7dcd347_floxif_mafia
-
Size
3.9MB
-
Sample
250105-rp4k4swqaw
-
MD5
7483be8126da1f9f54081abba7dcd347
-
SHA1
59a9a3d1709e7f8ac687009fcc7780fde8d1afba
-
SHA256
21678d3085c6d812e2fc7dcda91695850726fa40c66fe8ef3e6a59ca44ca18f9
-
SHA512
ab30cf4d04ca91b5a0bf9783dccd2837595fb3c88cea9190e143ddb78b337e142472d5cfb236f429e5ba2fec4bdf50d9b46203b904d7cbfd1b833d0249829a2b
-
SSDEEP
98304:1g+ESjo/Z6DRwcEtzCyQWuKglLgOQ/Pn9rj+De0nzQUy3:1g+ESq6bOuTghn9rj+DoU0
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-05_7483be8126da1f9f54081abba7dcd347_floxif_mafia.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2025-01-05_7483be8126da1f9f54081abba7dcd347_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-05_7483be8126da1f9f54081abba7dcd347_floxif_mafia
-
Size
3.9MB
-
MD5
7483be8126da1f9f54081abba7dcd347
-
SHA1
59a9a3d1709e7f8ac687009fcc7780fde8d1afba
-
SHA256
21678d3085c6d812e2fc7dcda91695850726fa40c66fe8ef3e6a59ca44ca18f9
-
SHA512
ab30cf4d04ca91b5a0bf9783dccd2837595fb3c88cea9190e143ddb78b337e142472d5cfb236f429e5ba2fec4bdf50d9b46203b904d7cbfd1b833d0249829a2b
-
SSDEEP
98304:1g+ESjo/Z6DRwcEtzCyQWuKglLgOQ/Pn9rj+De0nzQUy3:1g+ESq6bOuTghn9rj+DoU0
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-