General
-
Target
2025-02-06_34e3e46f5680e5bc3aea36dd224a08bc_floxif_mafia
-
Size
3.9MB
-
Sample
250206-st8w3a1jbr
-
MD5
34e3e46f5680e5bc3aea36dd224a08bc
-
SHA1
fa1bb20ca3641aa043d822cd85cbef10ce7c4ba8
-
SHA256
d22ab2eff9176cc96e53313bf78537166440ae2925ae74c6b9616ba4adb619ef
-
SHA512
c0f50b10fd0b78af1aa195875432321e28db7d1d3881c4b319b0819183a3d8dd285f630f5bde5dbb42dcc2878a89344da99e6258207aaba814fb3f7509d56b1b
-
SSDEEP
98304:1g+ESjoa9kZ6qRwcEtzCyQWuKglLgeQ/Pn9rj+De0nzQUyk:1g+ESJ9k60OuTgRn9rj+DoUn
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-06_34e3e46f5680e5bc3aea36dd224a08bc_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-06_34e3e46f5680e5bc3aea36dd224a08bc_floxif_mafia
-
Size
3.9MB
-
MD5
34e3e46f5680e5bc3aea36dd224a08bc
-
SHA1
fa1bb20ca3641aa043d822cd85cbef10ce7c4ba8
-
SHA256
d22ab2eff9176cc96e53313bf78537166440ae2925ae74c6b9616ba4adb619ef
-
SHA512
c0f50b10fd0b78af1aa195875432321e28db7d1d3881c4b319b0819183a3d8dd285f630f5bde5dbb42dcc2878a89344da99e6258207aaba814fb3f7509d56b1b
-
SSDEEP
98304:1g+ESjoa9kZ6qRwcEtzCyQWuKglLgeQ/Pn9rj+De0nzQUyk:1g+ESJ9k60OuTgRn9rj+DoUn
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-