General
-
Target
2024-12-18_d2cf801625b36725f2d0171f79079027_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
241218-pnjs7sznhj
-
MD5
d2cf801625b36725f2d0171f79079027
-
SHA1
ce969380b625ae8708a3227cf70f8755da6cad96
-
SHA256
9c23e69840b2da574c669ab8a59e56b32c074257f427e287a4fac69d6888f0a5
-
SHA512
88f95d7ade31ea4017dcbd93f53b0060d1cbcd578a6da9be8eb2c65183c30869c8690b7504c62f581f6c9d343966b55251d1cfcec701134e232a90281e62772d
-
SSDEEP
49152:Flks4A6lVLX6Sc600FFIIsTp69FlNN7boUvH6u//zHWwhXPwMQ9i9ZMW/KMZKWK0:/n6r6+0aFIIsTY9Fl/7boUi+awZPwMQa
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-18_d2cf801625b36725f2d0171f79079027_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-18_d2cf801625b36725f2d0171f79079027_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
d2cf801625b36725f2d0171f79079027
-
SHA1
ce969380b625ae8708a3227cf70f8755da6cad96
-
SHA256
9c23e69840b2da574c669ab8a59e56b32c074257f427e287a4fac69d6888f0a5
-
SHA512
88f95d7ade31ea4017dcbd93f53b0060d1cbcd578a6da9be8eb2c65183c30869c8690b7504c62f581f6c9d343966b55251d1cfcec701134e232a90281e62772d
-
SSDEEP
49152:Flks4A6lVLX6Sc600FFIIsTp69FlNN7boUvH6u//zHWwhXPwMQ9i9ZMW/KMZKWK0:/n6r6+0aFIIsTY9Fl/7boUi+awZPwMQa
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-