General
-
Target
2025-02-07_97a412e25f70ebda61e8e80183f3d60e_floxif_mafia
-
Size
2.2MB
-
Sample
250207-hn9ajaspey
-
MD5
97a412e25f70ebda61e8e80183f3d60e
-
SHA1
cee61e7f410ccff3e517cafd35b588bd9830f4c4
-
SHA256
d9a8023ffce6526fe4e66eb34e78b8f11163c0688e0fdf2d7283be5544f56d8e
-
SHA512
32ebcd47fa5aaa628cfb48c1acafdefddd8bca68cd582f72295f603fb23d148da032e332a70a481f9ad41a2176047fee69346ea99b38bc2023713493c13de73d
-
SSDEEP
49152:Kc6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7PJDz3pVO6pBfLP8rIdhOMRL5wyOKSeO:6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7I
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-07_97a412e25f70ebda61e8e80183f3d60e_floxif_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-07_97a412e25f70ebda61e8e80183f3d60e_floxif_mafia
-
Size
2.2MB
-
MD5
97a412e25f70ebda61e8e80183f3d60e
-
SHA1
cee61e7f410ccff3e517cafd35b588bd9830f4c4
-
SHA256
d9a8023ffce6526fe4e66eb34e78b8f11163c0688e0fdf2d7283be5544f56d8e
-
SHA512
32ebcd47fa5aaa628cfb48c1acafdefddd8bca68cd582f72295f603fb23d148da032e332a70a481f9ad41a2176047fee69346ea99b38bc2023713493c13de73d
-
SSDEEP
49152:Kc6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7PJDz3pVO6pBfLP8rIdhOMRL5wyOKSeO:6tJFd5lBtMp9B1ZP7gg50r0n5/znbX7I
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-