General
-
Target
2025-01-28_a2b5e55cb2991a94d0b74f9ef94c7f3c_floxif_mafia
-
Size
3.9MB
-
Sample
250128-w4hz6szrej
-
MD5
a2b5e55cb2991a94d0b74f9ef94c7f3c
-
SHA1
6bfcd0c05036cfdf13e358e26055b6b305dc93aa
-
SHA256
e0cb5def16d40e1d1d4a1f49693c755ec6ec0ec0277036f6bc50005b71e7604b
-
SHA512
ab040cd8a443c026cb7d3b05d315ad61c1245b3d6e445c69a5525024f02313a8a5031b7620712628a398b10e545e3c2b86ae17cfa32ac6b235928f2769512016
-
SSDEEP
98304:1gKESjoa9kZ6DRwcEtzCyQWuKglLg0Q/Pn9rj+De0nzQUym:1gKESJ9k6bOuTgDn9rj+DoUd
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-28_a2b5e55cb2991a94d0b74f9ef94c7f3c_floxif_mafia.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-28_a2b5e55cb2991a94d0b74f9ef94c7f3c_floxif_mafia
-
Size
3.9MB
-
MD5
a2b5e55cb2991a94d0b74f9ef94c7f3c
-
SHA1
6bfcd0c05036cfdf13e358e26055b6b305dc93aa
-
SHA256
e0cb5def16d40e1d1d4a1f49693c755ec6ec0ec0277036f6bc50005b71e7604b
-
SHA512
ab040cd8a443c026cb7d3b05d315ad61c1245b3d6e445c69a5525024f02313a8a5031b7620712628a398b10e545e3c2b86ae17cfa32ac6b235928f2769512016
-
SSDEEP
98304:1gKESjoa9kZ6DRwcEtzCyQWuKglLg0Q/Pn9rj+De0nzQUym:1gKESJ9k6bOuTgDn9rj+DoUd
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-