General

  • Target

    TrojanDropper.Win32.Floxif-881fa82e7cd7a08691f6d8795c37e3edf2d9c134ee1dc01d3251775a0f04c503N

  • Size

    80KB

  • MD5

    da876b1ccfc32e48447fb2bcd97d7100

  • SHA1

    caa2d84d33c8701408dbb04aa50929ec0cb39982

  • SHA256

    881fa82e7cd7a08691f6d8795c37e3edf2d9c134ee1dc01d3251775a0f04c503

  • SHA512

    8236977145e3419ede6c56d53be466376064ab94a888ad41309884080922892475bc13f3b1767f421241d89716cc2f7a853e3df27cc76dd7b838f8e53077b646

  • SSDEEP

    1536:5POOhfbOjovgdVydUgoNrwBZXGDaZ1QIxrfItMgR7ZaO+fGxHZPEZ9lpy:5dbwovEVyqgoZmZXWfIdQdRaefPslE

Score
10/10

Malware Config

Signatures

  • Detects Floxif payload 1 IoCs
  • Floxif family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • TrojanDropper.Win32.Floxif-881fa82e7cd7a08691f6d8795c37e3edf2d9c134ee1dc01d3251775a0f04c503N
    .dll windows:4 windows x86 arch:x86


    Headers

    Exports

    Sections

  • out.upx
    .dll windows:4 windows x86 arch:x86


    Headers

    Sections