General
-
Target
2025-02-05_d9c260121a42a7a8df2f191f4a33f08c_floxif_mafia
-
Size
2.5MB
-
Sample
250205-plz3eawma1
-
MD5
d9c260121a42a7a8df2f191f4a33f08c
-
SHA1
cf1fdf6865a4c552878304dd4616139c4f327a92
-
SHA256
67ba5f787e82b1b2b65558fd92bb00663a373a076f079d891582ecceeb3448a1
-
SHA512
b199185183bdb43a25212820527cb2e04f45f0e8b462f11b641d308a881fb88d449ddc25ec62396d0ac766fcf9054924d1f9d665fcb221375c01993a63529ce1
-
SSDEEP
49152:5uIIKQofs2hPd2l177BTK2VbDsar1YDjD:5jdfs2hPIl1/E
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-05_d9c260121a42a7a8df2f191f4a33f08c_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-05_d9c260121a42a7a8df2f191f4a33f08c_floxif_mafia
-
Size
2.5MB
-
MD5
d9c260121a42a7a8df2f191f4a33f08c
-
SHA1
cf1fdf6865a4c552878304dd4616139c4f327a92
-
SHA256
67ba5f787e82b1b2b65558fd92bb00663a373a076f079d891582ecceeb3448a1
-
SHA512
b199185183bdb43a25212820527cb2e04f45f0e8b462f11b641d308a881fb88d449ddc25ec62396d0ac766fcf9054924d1f9d665fcb221375c01993a63529ce1
-
SSDEEP
49152:5uIIKQofs2hPd2l177BTK2VbDsar1YDjD:5jdfs2hPIl1/E
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-