General
-
Target
2025-02-03_87019fe5f6b425280ae3dea4d066722b_floxif_mafia
-
Size
1.7MB
-
Sample
250203-pmr37aspgn
-
MD5
87019fe5f6b425280ae3dea4d066722b
-
SHA1
e4529e6d6cc2584eea1246aac6e2aaffa92247a4
-
SHA256
eb7c2e1a8996192dffb9948f3bd5adafaeb601a632af2049aa394296279b9b4f
-
SHA512
ab2bc9ca4eb8e4cb8324612b4d520e67e2184a70e6fa6ab38088195211093f7dc656e24f6dc23cc9bf253db98c30be66eebbec5b6cb7d5a6291c5e808c094de1
-
SSDEEP
49152:VsidgwlBy1jFUmct6twoK1AarZPr9YBy3Yy+CxhTiajWPPkWjBI2Z0nONLji:owlBy1jDct8s1Aardr9YBy3YHenusWjc
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-03_87019fe5f6b425280ae3dea4d066722b_floxif_mafia.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2025-02-03_87019fe5f6b425280ae3dea4d066722b_floxif_mafia
-
Size
1.7MB
-
MD5
87019fe5f6b425280ae3dea4d066722b
-
SHA1
e4529e6d6cc2584eea1246aac6e2aaffa92247a4
-
SHA256
eb7c2e1a8996192dffb9948f3bd5adafaeb601a632af2049aa394296279b9b4f
-
SHA512
ab2bc9ca4eb8e4cb8324612b4d520e67e2184a70e6fa6ab38088195211093f7dc656e24f6dc23cc9bf253db98c30be66eebbec5b6cb7d5a6291c5e808c094de1
-
SSDEEP
49152:VsidgwlBy1jFUmct6twoK1AarZPr9YBy3Yy+CxhTiajWPPkWjBI2Z0nONLji:owlBy1jDct8s1Aardr9YBy3YHenusWjc
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-