General
-
Target
2025-02-06_a445bc8a0f34632247e04a38c2a7bcd3_floxif_mafia
-
Size
3.6MB
-
Sample
250206-kcz9layrdz
-
MD5
a445bc8a0f34632247e04a38c2a7bcd3
-
SHA1
34650e353affaadfe0c22e294a0d2c2ac897bdde
-
SHA256
b70f07e7a9c3fd8c289631b81a29a7c448080cf619bc5eb80f75767a3b524205
-
SHA512
fa97fe22a5675570d5f400e0a9cf7b023b3b6583e81a19386f3f32520f2cecdaa3e764683f6645d6a7ab6534e1b9f6b1dab19e53f8ac3a37897a5547278ee793
-
SSDEEP
98304:pHJQppeCYmAHvt5VO+7DaDW/hokPCStf6K854e0arQ:pHJQp4vbaD3krf6K85NQ
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-06_a445bc8a0f34632247e04a38c2a7bcd3_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-06_a445bc8a0f34632247e04a38c2a7bcd3_floxif_mafia
-
Size
3.6MB
-
MD5
a445bc8a0f34632247e04a38c2a7bcd3
-
SHA1
34650e353affaadfe0c22e294a0d2c2ac897bdde
-
SHA256
b70f07e7a9c3fd8c289631b81a29a7c448080cf619bc5eb80f75767a3b524205
-
SHA512
fa97fe22a5675570d5f400e0a9cf7b023b3b6583e81a19386f3f32520f2cecdaa3e764683f6645d6a7ab6534e1b9f6b1dab19e53f8ac3a37897a5547278ee793
-
SSDEEP
98304:pHJQppeCYmAHvt5VO+7DaDW/hokPCStf6K854e0arQ:pHJQp4vbaD3krf6K85NQ
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-