General
-
Target
2025-02-03_2939cf42f621dd71540d18b3cc1f5470_floxif_mafia
-
Size
1.7MB
-
Sample
250203-pl81baspfj
-
MD5
2939cf42f621dd71540d18b3cc1f5470
-
SHA1
cdbf3911955e74090536234a7149e1e25959fe53
-
SHA256
698b4518701a89797f78c1d6fe53159785a9c522e0e0e1072b3e01340c150c2a
-
SHA512
635a9e340a808ae90127a13f0617d17c0f9073fa422ee29fbf09f1a1f9f8192210ae973f7a36cbc122a902e344c164f45fe9d9eb40fa12f07fdf0f6eff116384
-
SSDEEP
49152:VsidgwlBy1jFUmct6twoK1AarZPr9nkVBy3Yy+CxhTBfjWPPkWjBI2Z0nONLO:owlBy1jDct8s1Aardr9nkVBy3YHeHusL
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_2939cf42f621dd71540d18b3cc1f5470_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-03_2939cf42f621dd71540d18b3cc1f5470_floxif_mafia
-
Size
1.7MB
-
MD5
2939cf42f621dd71540d18b3cc1f5470
-
SHA1
cdbf3911955e74090536234a7149e1e25959fe53
-
SHA256
698b4518701a89797f78c1d6fe53159785a9c522e0e0e1072b3e01340c150c2a
-
SHA512
635a9e340a808ae90127a13f0617d17c0f9073fa422ee29fbf09f1a1f9f8192210ae973f7a36cbc122a902e344c164f45fe9d9eb40fa12f07fdf0f6eff116384
-
SSDEEP
49152:VsidgwlBy1jFUmct6twoK1AarZPr9nkVBy3Yy+CxhTBfjWPPkWjBI2Z0nONLO:owlBy1jDct8s1Aardr9nkVBy3YHeHusL
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-