General

  • Target

    b372a414bb047baf32e64c1535eac9d2ec22ad2826821c5734bd59a29d3e5f4fN

  • Size

    76KB

  • MD5

    797e43b839f7f672133ac81a330addb0

  • SHA1

    3a5b6a4e946fdb94fd1b1b502499c4b3d5b73991

  • SHA256

    b372a414bb047baf32e64c1535eac9d2ec22ad2826821c5734bd59a29d3e5f4f

  • SHA512

    f2df92f68b7008cb44101b722d556cf801107edf8c930272fa4c7b6c866c76389e43ff1ada501ef62fa93d579aeb0a20e10d53d50120e40470a992e6d4c2a36b

  • SSDEEP

    1536:YjV8y93KQpFQmPLRk7G50zy/riF12jvRyo0hQk7ZAPTcQe+T6Zn:c8y93KQjy7G55riF1cMo034In

Score
10/10

Malware Config

Signatures

  • Detects Floxif payload 1 IoCs
  • Floxif family
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

Files

  • b372a414bb047baf32e64c1535eac9d2ec22ad2826821c5734bd59a29d3e5f4fN
    .dll windows:4 windows x86 arch:x86


    Headers

    Exports

    Sections

  • out.upx
    .dll windows:4 windows x86 arch:x86


    Headers

    Sections