General
-
Target
2025-01-20_e9a9ab0057b487d0367c40d5f53203c6_floxif_mafia
-
Size
2.5MB
-
Sample
250120-lqx7tstlar
-
MD5
e9a9ab0057b487d0367c40d5f53203c6
-
SHA1
8ca38f0b8be66c8f960dcbe1b245d0a7fb29c6fe
-
SHA256
4176f303b274a4280a706a7d81a7dbe1aa0fc52c402a6f530f61e357785cb9e6
-
SHA512
647105a32f48f1373c26c05e77a0ef866d5fbc0904c8499b4346e872f7da74c386adf9f4d3fe4f6ebbdca7f08e68e6f18d5dd2802d2c548c931d862abe58aa85
-
SSDEEP
49152:tuIWK2ofs2hPd2l177BTK2VbDsar1YDjl:tjBfs2hPIl1/S
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-20_e9a9ab0057b487d0367c40d5f53203c6_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-20_e9a9ab0057b487d0367c40d5f53203c6_floxif_mafia
-
Size
2.5MB
-
MD5
e9a9ab0057b487d0367c40d5f53203c6
-
SHA1
8ca38f0b8be66c8f960dcbe1b245d0a7fb29c6fe
-
SHA256
4176f303b274a4280a706a7d81a7dbe1aa0fc52c402a6f530f61e357785cb9e6
-
SHA512
647105a32f48f1373c26c05e77a0ef866d5fbc0904c8499b4346e872f7da74c386adf9f4d3fe4f6ebbdca7f08e68e6f18d5dd2802d2c548c931d862abe58aa85
-
SSDEEP
49152:tuIWK2ofs2hPd2l177BTK2VbDsar1YDjl:tjBfs2hPIl1/S
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-