General
-
Target
2025-02-02_3bbe93dd88a442b1240ce51e45a5544f_floxif_mafia
-
Size
2.5MB
-
Sample
250202-rqendavpdw
-
MD5
3bbe93dd88a442b1240ce51e45a5544f
-
SHA1
b43d5892977ee85c098155635dfdbf2245db8015
-
SHA256
69d0b2137a92585593d538298cbd41ad8b02f02ecd112631fab5123818f3c3a1
-
SHA512
dafee0663c917e8d432e94abf315b07e5cb68abc46317c5758c70eaebbd6737164260ee4e260c5fc7d5cdef4183df14f9e2101d20306cad00edbb54b708d95d7
-
SSDEEP
49152:tuI2Kvofs2hPd2l177BTK2VbDsar1YDji:tjIfs2hPIl1/F
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_3bbe93dd88a442b1240ce51e45a5544f_floxif_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-02_3bbe93dd88a442b1240ce51e45a5544f_floxif_mafia.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
2025-02-02_3bbe93dd88a442b1240ce51e45a5544f_floxif_mafia
-
Size
2.5MB
-
MD5
3bbe93dd88a442b1240ce51e45a5544f
-
SHA1
b43d5892977ee85c098155635dfdbf2245db8015
-
SHA256
69d0b2137a92585593d538298cbd41ad8b02f02ecd112631fab5123818f3c3a1
-
SHA512
dafee0663c917e8d432e94abf315b07e5cb68abc46317c5758c70eaebbd6737164260ee4e260c5fc7d5cdef4183df14f9e2101d20306cad00edbb54b708d95d7
-
SSDEEP
49152:tuI2Kvofs2hPd2l177BTK2VbDsar1YDji:tjIfs2hPIl1/F
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-