General
-
Target
2024-08-12_b39f9b4c3db0bec51bc60d4fc9680d85_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
240812-jgpg8awbkf
-
MD5
b39f9b4c3db0bec51bc60d4fc9680d85
-
SHA1
becc2364cc259b7d85ef882922afc1366af5da4f
-
SHA256
3984c4d50f2be98039be3b234c8ceda83ff937d98d89b489f08cf40ea832efec
-
SHA512
ae500d2b9eac091ea9fd0454240d11cd0f07098f022905b540dc5da18f507bfd920a33e6846abc5748d0214f6f81d2063616ef0e0c5a4414859fdc91da681888
-
SSDEEP
49152:Flks4A6lVLX6Sc6CFNUFFIIsTp69FlNN7boUvH6u//zHSwhXPwMQ9i9ZMW/KMZK+:/n6r6+CFUFIIsTY9Fl/7boUi+2wZPwMZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-12_b39f9b4c3db0bec51bc60d4fc9680d85_floxif_hijackloader_mafia.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-08-12_b39f9b4c3db0bec51bc60d4fc9680d85_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
b39f9b4c3db0bec51bc60d4fc9680d85
-
SHA1
becc2364cc259b7d85ef882922afc1366af5da4f
-
SHA256
3984c4d50f2be98039be3b234c8ceda83ff937d98d89b489f08cf40ea832efec
-
SHA512
ae500d2b9eac091ea9fd0454240d11cd0f07098f022905b540dc5da18f507bfd920a33e6846abc5748d0214f6f81d2063616ef0e0c5a4414859fdc91da681888
-
SSDEEP
49152:Flks4A6lVLX6Sc6CFNUFFIIsTp69FlNN7boUvH6u//zHSwhXPwMQ9i9ZMW/KMZK+:/n6r6+CFUFIIsTY9Fl/7boUi+2wZPwMZ
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-