General
-
Target
2025-01-20_bc0f3dd543582e9362627e9dde522cde_floxif_mafia
-
Size
3.9MB
-
Sample
250120-vy5fjszrbz
-
MD5
bc0f3dd543582e9362627e9dde522cde
-
SHA1
62029c81785d82b2d14b8202243ec551c63b67eb
-
SHA256
a5d4056e4ba118a2685506fbf1e8dc65c64ee422396a595b777b680aa5b179b5
-
SHA512
3fec55002f53193edcfbd0d10ee70ae50aeb39303f9713b03404d195af21635aa9a03cd2f7898e7ec9b8d38c3c1417df6f009b93330b788129873b79ce0f7dfd
-
SSDEEP
98304:1g+ESjoUZ6DRwcEtzCyQWuKglLgkQ/Pn9rj+De0nzQUyC:1g+ESb6bOuTgTn9rj+DoUt
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-20_bc0f3dd543582e9362627e9dde522cde_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-20_bc0f3dd543582e9362627e9dde522cde_floxif_mafia
-
Size
3.9MB
-
MD5
bc0f3dd543582e9362627e9dde522cde
-
SHA1
62029c81785d82b2d14b8202243ec551c63b67eb
-
SHA256
a5d4056e4ba118a2685506fbf1e8dc65c64ee422396a595b777b680aa5b179b5
-
SHA512
3fec55002f53193edcfbd0d10ee70ae50aeb39303f9713b03404d195af21635aa9a03cd2f7898e7ec9b8d38c3c1417df6f009b93330b788129873b79ce0f7dfd
-
SSDEEP
98304:1g+ESjoUZ6DRwcEtzCyQWuKglLgkQ/Pn9rj+De0nzQUyC:1g+ESb6bOuTgTn9rj+DoUt
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-