General
-
Target
2024-12-11_672385faa9d2a0250e9038dbe1310cf0_floxif_hijackloader_mafia
-
Size
20.1MB
-
Sample
241211-x9dhbazpdj
-
MD5
672385faa9d2a0250e9038dbe1310cf0
-
SHA1
da0c199f76a59689f13c5aefe2e58c45026918e4
-
SHA256
fdb2a8c1561afad305925b4674cd4e50b82098326d68113f0014e67c5f5d80b3
-
SHA512
29d86dcda7e2e847c7c5faa0b5771f6f5139b4a9eaa84ca571b5e2059ad197b12d9955e27666b9d736326e4ae16a4538eacbccb21324be5d49965d90029c5002
-
SSDEEP
393216:6wsmQyK0QtLJsv6tWKFdu9CnvUiOnKv647n+YlmYsf:jslbbDfvegmj
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-11_672385faa9d2a0250e9038dbe1310cf0_floxif_hijackloader_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2024-12-11_672385faa9d2a0250e9038dbe1310cf0_floxif_hijackloader_mafia
-
Size
20.1MB
-
MD5
672385faa9d2a0250e9038dbe1310cf0
-
SHA1
da0c199f76a59689f13c5aefe2e58c45026918e4
-
SHA256
fdb2a8c1561afad305925b4674cd4e50b82098326d68113f0014e67c5f5d80b3
-
SHA512
29d86dcda7e2e847c7c5faa0b5771f6f5139b4a9eaa84ca571b5e2059ad197b12d9955e27666b9d736326e4ae16a4538eacbccb21324be5d49965d90029c5002
-
SSDEEP
393216:6wsmQyK0QtLJsv6tWKFdu9CnvUiOnKv647n+YlmYsf:jslbbDfvegmj
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-