General
-
Target
2025-01-09_1a236732dcfcb17b26967ee5b1d1bfa2_floxif_mafia
-
Size
2.4MB
-
Sample
250109-atb8zssngl
-
MD5
1a236732dcfcb17b26967ee5b1d1bfa2
-
SHA1
811468960e97e8085d24cdb7325f4ffaa8d6f6b3
-
SHA256
9a81b483255af3b85887141b171e3f12c0e7437ddc91e87570413a1a04f5b3ae
-
SHA512
d38c556b7ea6e50e6238880f6744717bbc39512b4a49b1d7219db0e62d63c94398ea3fde36dfc0c5b6c09eadd69fcce61c048a9ae978edbf38357e9ff9687069
-
SSDEEP
49152:2Kq7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qT:w7AfrlyutLxC3sEwwM3UT
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-09_1a236732dcfcb17b26967ee5b1d1bfa2_floxif_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-01-09_1a236732dcfcb17b26967ee5b1d1bfa2_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-09_1a236732dcfcb17b26967ee5b1d1bfa2_floxif_mafia
-
Size
2.4MB
-
MD5
1a236732dcfcb17b26967ee5b1d1bfa2
-
SHA1
811468960e97e8085d24cdb7325f4ffaa8d6f6b3
-
SHA256
9a81b483255af3b85887141b171e3f12c0e7437ddc91e87570413a1a04f5b3ae
-
SHA512
d38c556b7ea6e50e6238880f6744717bbc39512b4a49b1d7219db0e62d63c94398ea3fde36dfc0c5b6c09eadd69fcce61c048a9ae978edbf38357e9ff9687069
-
SSDEEP
49152:2Kq7AkqIxGrGYyZa/tgrYJUGfZC3wA6EylfwEaFW31qT:w7AfrlyutLxC3sEwwM3UT
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1AppInit DLLs
1Pre-OS Boot
1Bootkit
1