General
-
Target
2025-01-20_b4d0de11077c4a68c4d6e7b7d15b88e5_floxif_mafia
-
Size
1.8MB
-
Sample
250120-pswcssyrdw
-
MD5
b4d0de11077c4a68c4d6e7b7d15b88e5
-
SHA1
448add7bdced91439e608cc061df60ce9987c484
-
SHA256
c1a15c1df8c42dcd90790ccebe6ac948603722ab5ac1cc4922f58590cf77e54a
-
SHA512
ed8cbc15e1ec417669cf189095a5631b24e7969270e41f0cd400ae54d405f4bd7a8676dfb33d567083badb0c6f090154a13773e384b204cd0ba3c11a8cf09a54
-
SSDEEP
49152:N5Zp6SIguuBR5+s5vvDwpPtw2vehhF4T8bBaqBeqyZSERu9WJ:N5qSfuu3v0pPBehhFVBpBeq0v
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-20_b4d0de11077c4a68c4d6e7b7d15b88e5_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-20_b4d0de11077c4a68c4d6e7b7d15b88e5_floxif_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-20_b4d0de11077c4a68c4d6e7b7d15b88e5_floxif_mafia
-
Size
1.8MB
-
MD5
b4d0de11077c4a68c4d6e7b7d15b88e5
-
SHA1
448add7bdced91439e608cc061df60ce9987c484
-
SHA256
c1a15c1df8c42dcd90790ccebe6ac948603722ab5ac1cc4922f58590cf77e54a
-
SHA512
ed8cbc15e1ec417669cf189095a5631b24e7969270e41f0cd400ae54d405f4bd7a8676dfb33d567083badb0c6f090154a13773e384b204cd0ba3c11a8cf09a54
-
SSDEEP
49152:N5Zp6SIguuBR5+s5vvDwpPtw2vehhF4T8bBaqBeqyZSERu9WJ:N5qSfuu3v0pPBehhFVBpBeq0v
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-