General
-
Target
2025-02-07_44a8ba413a7fddfa82bfa220814aba89_floxif_mafia
-
Size
2.2MB
-
Sample
250207-hef8dssmbv
-
MD5
44a8ba413a7fddfa82bfa220814aba89
-
SHA1
51dc1006182d451114c6cc75bdab6d90de5f140e
-
SHA256
ea3abf8483f40d2afc9595badc4ed0f3e25d349e4d679a52e50eb93d44f57e4f
-
SHA512
7214fdabdf773cbc89c084754b57ae6a680733d46004337ea31fcb2ba887611fa7e79e9e352cbce57eb4a9d5c7b8b9ef999e6135e7f1e08e2a50aab73168cbad
-
SSDEEP
49152:KcDtJFd5lBtMp9B1ZP7gg50r0n5/znbX7PJDz3pVO6pBfLP8rIdhOMRL5wyOKSeU:DtJFd5lBtMp9B1ZP7gg50r0n5/znbX7y
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-07_44a8ba413a7fddfa82bfa220814aba89_floxif_mafia.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-07_44a8ba413a7fddfa82bfa220814aba89_floxif_mafia.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
2025-02-07_44a8ba413a7fddfa82bfa220814aba89_floxif_mafia
-
Size
2.2MB
-
MD5
44a8ba413a7fddfa82bfa220814aba89
-
SHA1
51dc1006182d451114c6cc75bdab6d90de5f140e
-
SHA256
ea3abf8483f40d2afc9595badc4ed0f3e25d349e4d679a52e50eb93d44f57e4f
-
SHA512
7214fdabdf773cbc89c084754b57ae6a680733d46004337ea31fcb2ba887611fa7e79e9e352cbce57eb4a9d5c7b8b9ef999e6135e7f1e08e2a50aab73168cbad
-
SSDEEP
49152:KcDtJFd5lBtMp9B1ZP7gg50r0n5/znbX7PJDz3pVO6pBfLP8rIdhOMRL5wyOKSeU:DtJFd5lBtMp9B1ZP7gg50r0n5/znbX7y
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-