General
-
Target
2024-08-08_32acae2d44c8011ad593ae5c59be2179_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
240808-pntcmsxbnd
-
MD5
32acae2d44c8011ad593ae5c59be2179
-
SHA1
27ebbdd61c93f3d31b96245ac666133ff7d5f5b4
-
SHA256
502e154c35c53ea71c49ecbbb4d98e3b4a8d9ccbbbb2ef7e12fcbb25b5c6cd19
-
SHA512
1d79560e3df22739d9c0792fc244e48b45276fb723e8d0a08f9f7843f5cc9cb10edc79497f6f62bba13b56c461654144a000adf8017fc027c829e422fc3b8c79
-
SSDEEP
49152:Flks4A6lVLX6Sc60hNUFFIIsTp69FlNN7boUvH6u//zHUwhXPwMQ9i9ZMW/KMZKQ:/n6r6+0hUFIIsTY9Fl/7boUi+YwZPwMz
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_32acae2d44c8011ad593ae5c59be2179_floxif_hijackloader_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-08-08_32acae2d44c8011ad593ae5c59be2179_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
32acae2d44c8011ad593ae5c59be2179
-
SHA1
27ebbdd61c93f3d31b96245ac666133ff7d5f5b4
-
SHA256
502e154c35c53ea71c49ecbbb4d98e3b4a8d9ccbbbb2ef7e12fcbb25b5c6cd19
-
SHA512
1d79560e3df22739d9c0792fc244e48b45276fb723e8d0a08f9f7843f5cc9cb10edc79497f6f62bba13b56c461654144a000adf8017fc027c829e422fc3b8c79
-
SSDEEP
49152:Flks4A6lVLX6Sc60hNUFFIIsTp69FlNN7boUvH6u//zHUwhXPwMQ9i9ZMW/KMZKQ:/n6r6+0hUFIIsTY9Fl/7boUi+YwZPwMz
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-