General
-
Target
2025-02-02_174d1f32300fee312bea1ac171db13c5_floxif_mafia
-
Size
2.5MB
-
Sample
250202-sthpwaxmew
-
MD5
174d1f32300fee312bea1ac171db13c5
-
SHA1
efd0e1097f69734ee0616421a7a5f5d7ff7928cc
-
SHA256
8a93e7049686689b1c0030392dd1a78d4bf8c0f44f6265f3832c580493dbabca
-
SHA512
4152f2d90e82f39b8d8568b28831f5c935f911a95b197ee174cd505e88b8f2b21fb7f9a1c02174f039398eadc0a0b2ffc68aa1f49b5a4a4ea09b92ed087b0eeb
-
SSDEEP
49152:tuIeKlofs2hPd2l177BTK2VbDsar1YDjQ:tjufs2hPIl1/L
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_174d1f32300fee312bea1ac171db13c5_floxif_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2025-02-02_174d1f32300fee312bea1ac171db13c5_floxif_mafia
-
Size
2.5MB
-
MD5
174d1f32300fee312bea1ac171db13c5
-
SHA1
efd0e1097f69734ee0616421a7a5f5d7ff7928cc
-
SHA256
8a93e7049686689b1c0030392dd1a78d4bf8c0f44f6265f3832c580493dbabca
-
SHA512
4152f2d90e82f39b8d8568b28831f5c935f911a95b197ee174cd505e88b8f2b21fb7f9a1c02174f039398eadc0a0b2ffc68aa1f49b5a4a4ea09b92ed087b0eeb
-
SSDEEP
49152:tuIeKlofs2hPd2l177BTK2VbDsar1YDjQ:tjufs2hPIl1/L
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-