General
-
Target
2025-01-08_1199b01d4c3d26506cf672d5b8dcd0cf_floxif_mafia
-
Size
2.5MB
-
Sample
250108-jhvevszqax
-
MD5
1199b01d4c3d26506cf672d5b8dcd0cf
-
SHA1
4148628cd007181af14340864d394b0fa3eaac2e
-
SHA256
f5dfc5a5ce2e2cd6aeb165e1fabf84d354466b82b22640c02d5a6147958f5866
-
SHA512
65e9b4c6636853173ce8c1acc2f8e00a3e010f21a6f19dd7a0a22702a107485dad8e7b1b277cc567e992a32a04694b759d9d2921b0156f63fc41447aad4a22ee
-
SSDEEP
49152:ouIIKXofs2hPd2l177BTK2VbDsar1YDjI:ojWfs2hPIl1/L
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-08_1199b01d4c3d26506cf672d5b8dcd0cf_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-08_1199b01d4c3d26506cf672d5b8dcd0cf_floxif_mafia
-
Size
2.5MB
-
MD5
1199b01d4c3d26506cf672d5b8dcd0cf
-
SHA1
4148628cd007181af14340864d394b0fa3eaac2e
-
SHA256
f5dfc5a5ce2e2cd6aeb165e1fabf84d354466b82b22640c02d5a6147958f5866
-
SHA512
65e9b4c6636853173ce8c1acc2f8e00a3e010f21a6f19dd7a0a22702a107485dad8e7b1b277cc567e992a32a04694b759d9d2921b0156f63fc41447aad4a22ee
-
SSDEEP
49152:ouIIKXofs2hPd2l177BTK2VbDsar1YDjI:ojWfs2hPIl1/L
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-