General
-
Target
2025-01-20_e4983fbacc282d5df5ecbe91b30f273f_floxif_hacktools_mafia
-
Size
4.1MB
-
Sample
250120-lmelbatjdq
-
MD5
e4983fbacc282d5df5ecbe91b30f273f
-
SHA1
bb52c010bbfdda75332e926da8efedb91efc0f33
-
SHA256
d30a518b55df2bd62e52e4901f5baaa1d4a6eb9f73f75cfce372443b955901ac
-
SHA512
716d0060de3d883e118c4a944eb2a77311eab3c38351587d1ddca1633a55862b2f370ffad2acc565aae12621708a0711e33913c89051bd536a0f865c044c2a79
-
SSDEEP
98304:tiBG9Q7G8vnHbtPK2rXU8DTAaamA46PFS+ysoxB7mL/kyzqU6erO0grzwFRLNERE:tON7G8vHRK2rP4ALQLFzqU6qKzc5Ea1
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-20_e4983fbacc282d5df5ecbe91b30f273f_floxif_hacktools_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-20_e4983fbacc282d5df5ecbe91b30f273f_floxif_hacktools_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-20_e4983fbacc282d5df5ecbe91b30f273f_floxif_hacktools_mafia
-
Size
4.1MB
-
MD5
e4983fbacc282d5df5ecbe91b30f273f
-
SHA1
bb52c010bbfdda75332e926da8efedb91efc0f33
-
SHA256
d30a518b55df2bd62e52e4901f5baaa1d4a6eb9f73f75cfce372443b955901ac
-
SHA512
716d0060de3d883e118c4a944eb2a77311eab3c38351587d1ddca1633a55862b2f370ffad2acc565aae12621708a0711e33913c89051bd536a0f865c044c2a79
-
SSDEEP
98304:tiBG9Q7G8vnHbtPK2rXU8DTAaamA46PFS+ysoxB7mL/kyzqU6erO0grzwFRLNERE:tON7G8vHRK2rP4ALQLFzqU6qKzc5Ea1
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-