General
-
Target
2025-01-20_c92c32719f3593ddfb4567987513f9cb_floxif_mafia
-
Size
2.5MB
-
Sample
250120-ljw17aspct
-
MD5
c92c32719f3593ddfb4567987513f9cb
-
SHA1
a8304c0f22e1ba12ae7c3ad37393d78281634ac0
-
SHA256
8bd256109d65c1792605b31e52174a83906cbf233388016c069ecddc7c6e90f2
-
SHA512
4213546d34416fea1a3b18dbc3db129cf5b43fd4611b663491259d3e395ea7f41a41de54ffb43c5697e38a915c4077e6bb34b529f989c81642da46e8dbc04c32
-
SSDEEP
49152:kuIIK9ofs2hPd2l177BTK2VbDsar1YDj8:kjEfs2hPIl1/z
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-20_c92c32719f3593ddfb4567987513f9cb_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-20_c92c32719f3593ddfb4567987513f9cb_floxif_mafia
-
Size
2.5MB
-
MD5
c92c32719f3593ddfb4567987513f9cb
-
SHA1
a8304c0f22e1ba12ae7c3ad37393d78281634ac0
-
SHA256
8bd256109d65c1792605b31e52174a83906cbf233388016c069ecddc7c6e90f2
-
SHA512
4213546d34416fea1a3b18dbc3db129cf5b43fd4611b663491259d3e395ea7f41a41de54ffb43c5697e38a915c4077e6bb34b529f989c81642da46e8dbc04c32
-
SSDEEP
49152:kuIIK9ofs2hPd2l177BTK2VbDsar1YDj8:kjEfs2hPIl1/z
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-