General
-
Target
2025-01-10_80c525e07e04efdfa5d77ae4de08c27f_floxif_mafia
-
Size
2.5MB
-
Sample
250110-c8wx2s1qhr
-
MD5
80c525e07e04efdfa5d77ae4de08c27f
-
SHA1
3314610ab1938f89d6d391d718e38bd5ecc95d08
-
SHA256
7fb1a5ab3c47dcc38d2a40610092651a5e1e4e1bd136e3cfad1b05f0205f3136
-
SHA512
7631b93e5bb119b2aca180aae452ec5c9c6988bb5529e5a2f5859cf4ec49af5714fb024edfb9f5bc32a3e3c69f94cb9c4d0af003cf9118a71393852469600398
-
SSDEEP
49152:tuIIZhofs2hPd2l177BTK2VbDsar1YDj7:tjFfs2hPIl1/8
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_80c525e07e04efdfa5d77ae4de08c27f_floxif_mafia.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-10_80c525e07e04efdfa5d77ae4de08c27f_floxif_mafia
-
Size
2.5MB
-
MD5
80c525e07e04efdfa5d77ae4de08c27f
-
SHA1
3314610ab1938f89d6d391d718e38bd5ecc95d08
-
SHA256
7fb1a5ab3c47dcc38d2a40610092651a5e1e4e1bd136e3cfad1b05f0205f3136
-
SHA512
7631b93e5bb119b2aca180aae452ec5c9c6988bb5529e5a2f5859cf4ec49af5714fb024edfb9f5bc32a3e3c69f94cb9c4d0af003cf9118a71393852469600398
-
SSDEEP
49152:tuIIZhofs2hPd2l177BTK2VbDsar1YDj7:tjFfs2hPIl1/8
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-