General
-
Target
2024-12-17_da914e2f8105ec2903ed435d729cfdd8_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
241217-pwjs6szjc1
-
MD5
da914e2f8105ec2903ed435d729cfdd8
-
SHA1
83ef82af015e198666b5c6d3d62c869206fdb012
-
SHA256
88d9ab1fb085740fab1c836bd8348ec1034f4ffde2f5275180f80b690d09e894
-
SHA512
67077881dd49650425c567bca7ea3f34724dad31f83feac8c551d8539b96d2043b9c09719d0c7ec6af47996e9f1ea6ffb8c00fcd0dd151ae6cba7bef84f5acd4
-
SSDEEP
49152:KIGYB+v+ta6viBRbJXA+Tatqc5doCUW5SwFAvhDzaDrhFmA3RcnZPCCGiPxe7W/C:K6TKB/DKqc5doCUW5jFAvBODXRAZPCCW
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_da914e2f8105ec2903ed435d729cfdd8_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-17_da914e2f8105ec2903ed435d729cfdd8_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
da914e2f8105ec2903ed435d729cfdd8
-
SHA1
83ef82af015e198666b5c6d3d62c869206fdb012
-
SHA256
88d9ab1fb085740fab1c836bd8348ec1034f4ffde2f5275180f80b690d09e894
-
SHA512
67077881dd49650425c567bca7ea3f34724dad31f83feac8c551d8539b96d2043b9c09719d0c7ec6af47996e9f1ea6ffb8c00fcd0dd151ae6cba7bef84f5acd4
-
SSDEEP
49152:KIGYB+v+ta6viBRbJXA+Tatqc5doCUW5SwFAvhDzaDrhFmA3RcnZPCCGiPxe7W/C:K6TKB/DKqc5doCUW5jFAvBODXRAZPCCW
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-