General
-
Target
2024-08-12_ce2e61494539be8b47b974cb6db3c562_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
240812-jhjy5awbnd
-
MD5
ce2e61494539be8b47b974cb6db3c562
-
SHA1
3ecdcf356864b7ba574fa2320ab49a24063d10b5
-
SHA256
6cf850e6d57ac3e9441329fd9cf2a3df64684cdd0ac44037741ccda083993dd3
-
SHA512
1696cb9d43b96dc00103dad25a2675dae8caec93c80f084cf50c34a6315fc6b631ddea0f7dad06447f9d36d777ba9826bdbb7e2f2f9427a3008060c0ca1f6bda
-
SSDEEP
49152:KaSofyDdWWqJXBhgmvQojZ2toFPVmyN8KrOR23P2yYI1b7B5lcdtH9jR9W/KMZKc:LudEBhzQoMtoFPVmyN8KrOR23O8N77lx
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-12_ce2e61494539be8b47b974cb6db3c562_floxif_hijackloader_mafia.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-08-12_ce2e61494539be8b47b974cb6db3c562_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
ce2e61494539be8b47b974cb6db3c562
-
SHA1
3ecdcf356864b7ba574fa2320ab49a24063d10b5
-
SHA256
6cf850e6d57ac3e9441329fd9cf2a3df64684cdd0ac44037741ccda083993dd3
-
SHA512
1696cb9d43b96dc00103dad25a2675dae8caec93c80f084cf50c34a6315fc6b631ddea0f7dad06447f9d36d777ba9826bdbb7e2f2f9427a3008060c0ca1f6bda
-
SSDEEP
49152:KaSofyDdWWqJXBhgmvQojZ2toFPVmyN8KrOR23P2yYI1b7B5lcdtH9jR9W/KMZKc:LudEBhzQoMtoFPVmyN8KrOR23O8N77lx
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-