General
-
Target
2025-01-26_2b89ae1d6476d52f0d99e24a06aac40a_floxif_mafia
-
Size
1.7MB
-
Sample
250126-bv923synbr
-
MD5
2b89ae1d6476d52f0d99e24a06aac40a
-
SHA1
7ae252120e24f5f22a2a822338c77b3addadb2d0
-
SHA256
dc3b3f2e5fc2f47c4df9cb34a7800a036ece7b50f77019fad397018608250e23
-
SHA512
f3d595d4fcb817b0ed0573ce14ed6f3923a03b4a261c2acd2d6b016b1d8a5c36137a52409d0bbdf2ea9885e72505bc081386c17320cd6bf25569848b7ee5ca33
-
SSDEEP
49152:tArFbnK0+fNcYyvbcKp+2E+xZg7eSUMbnzD67uFwIyTeaXdB:YFbnK7NDyvbcKp+2E+/VSUMbndwIyTeK
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-26_2b89ae1d6476d52f0d99e24a06aac40a_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-26_2b89ae1d6476d52f0d99e24a06aac40a_floxif_mafia
-
Size
1.7MB
-
MD5
2b89ae1d6476d52f0d99e24a06aac40a
-
SHA1
7ae252120e24f5f22a2a822338c77b3addadb2d0
-
SHA256
dc3b3f2e5fc2f47c4df9cb34a7800a036ece7b50f77019fad397018608250e23
-
SHA512
f3d595d4fcb817b0ed0573ce14ed6f3923a03b4a261c2acd2d6b016b1d8a5c36137a52409d0bbdf2ea9885e72505bc081386c17320cd6bf25569848b7ee5ca33
-
SSDEEP
49152:tArFbnK0+fNcYyvbcKp+2E+xZg7eSUMbnzD67uFwIyTeaXdB:YFbnK7NDyvbcKp+2E+/VSUMbndwIyTeK
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-