General
-
Target
2025-02-02_a03de6ee628478eecba5f9b8e4d09279_floxif_mafia
-
Size
3.9MB
-
Sample
250202-ngs8ma1pfk
-
MD5
a03de6ee628478eecba5f9b8e4d09279
-
SHA1
9bba92e69d0a4ad3ba97a3c3fa6193d191039d08
-
SHA256
a30fe76480328f9fb7cc963970c1b28476685f34723735002ea80c409897e935
-
SHA512
aa1db31a945ef370d32ef831c3eed74bdc3319cd03cb707204a6ec30cba3810b27e7daaee9d94db528c07dc34848ae1511c148a717510244b1f8cc043c44aacf
-
SSDEEP
98304:Hg+ESjoa9kZ6DRwcEtzCyQWuKglLgxQ/Pn9rj+De0nzQUyT:Hg+ESJ9k6bOuTgan9rj+DoU0
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_a03de6ee628478eecba5f9b8e4d09279_floxif_mafia.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2025-02-02_a03de6ee628478eecba5f9b8e4d09279_floxif_mafia
-
Size
3.9MB
-
MD5
a03de6ee628478eecba5f9b8e4d09279
-
SHA1
9bba92e69d0a4ad3ba97a3c3fa6193d191039d08
-
SHA256
a30fe76480328f9fb7cc963970c1b28476685f34723735002ea80c409897e935
-
SHA512
aa1db31a945ef370d32ef831c3eed74bdc3319cd03cb707204a6ec30cba3810b27e7daaee9d94db528c07dc34848ae1511c148a717510244b1f8cc043c44aacf
-
SSDEEP
98304:Hg+ESjoa9kZ6DRwcEtzCyQWuKglLgxQ/Pn9rj+De0nzQUyT:Hg+ESJ9k6bOuTgan9rj+DoU0
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-