General
-
Target
2024-12-20_8414911712054009cb51ec015493e6a7_floxif_hijackloader_mafia
-
Size
562KB
-
Sample
241220-dyq5gsymfr
-
MD5
8414911712054009cb51ec015493e6a7
-
SHA1
07fa7a1888d2c1b01a62825af34b009ec66798e5
-
SHA256
60b9718a4960573b3ca2f04c141145fdf86c6dd4ad3e372049c29fff7dd1f690
-
SHA512
49946fb7c2f5714f4e080ace367b0df674ec1ed87f8123a61e9951a894c22de078e6656ddc0cebbb446e7ad8106a779f1898cb3e97c24b39249f11824ce04fd3
-
SSDEEP
12288:YnR+T6jdSemajH7wEGP4/uSlvdG4BjvrEH7Z:YnR+T6BSeX77fGivd3rEH7Z
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_8414911712054009cb51ec015493e6a7_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-20_8414911712054009cb51ec015493e6a7_floxif_hijackloader_mafia
-
Size
562KB
-
MD5
8414911712054009cb51ec015493e6a7
-
SHA1
07fa7a1888d2c1b01a62825af34b009ec66798e5
-
SHA256
60b9718a4960573b3ca2f04c141145fdf86c6dd4ad3e372049c29fff7dd1f690
-
SHA512
49946fb7c2f5714f4e080ace367b0df674ec1ed87f8123a61e9951a894c22de078e6656ddc0cebbb446e7ad8106a779f1898cb3e97c24b39249f11824ce04fd3
-
SSDEEP
12288:YnR+T6jdSemajH7wEGP4/uSlvdG4BjvrEH7Z:YnR+T6BSeX77fGivd3rEH7Z
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-