General
-
Target
2024-08-02_ff0f1f9b84e17ad894512c189eb7b9e8_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
240802-pvm47s1fjh
-
MD5
ff0f1f9b84e17ad894512c189eb7b9e8
-
SHA1
8da2291bb28017a27f8b2d4ac058b17ee812c71a
-
SHA256
63b42a29a5940de20a11f1b25c749073017cdd448c48b2a2e9ae8d2be6811aa6
-
SHA512
733dfcb2bde42daca330bd0917c53ff106fa2988207297cd917842aa5595279eb4e8544572a4daeb432ca78613e3518e563999e860cf5655c1cac9e6b3e4f7ee
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7boHvH6u//zHLwhXPwMQ9i9ZMW/KMZKl:/n6r6+0FUFIIsTY9Fl/7boHi+fwZPwMO
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-02_ff0f1f9b84e17ad894512c189eb7b9e8_floxif_hijackloader_mafia.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-02_ff0f1f9b84e17ad894512c189eb7b9e8_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
ff0f1f9b84e17ad894512c189eb7b9e8
-
SHA1
8da2291bb28017a27f8b2d4ac058b17ee812c71a
-
SHA256
63b42a29a5940de20a11f1b25c749073017cdd448c48b2a2e9ae8d2be6811aa6
-
SHA512
733dfcb2bde42daca330bd0917c53ff106fa2988207297cd917842aa5595279eb4e8544572a4daeb432ca78613e3518e563999e860cf5655c1cac9e6b3e4f7ee
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7boHvH6u//zHLwhXPwMQ9i9ZMW/KMZKl:/n6r6+0FUFIIsTY9Fl/7boHi+fwZPwMO
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-