General
-
Target
2024-12-22_5cd0ff310b46251ac44fde6ec3860f8d_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
241222-plhs5axqcv
-
MD5
5cd0ff310b46251ac44fde6ec3860f8d
-
SHA1
d0ed680fbcb4bdf79c2c3c9e5d7f47d0835eb635
-
SHA256
2965951d342ac271795613caaf67c157ac5298b943326c567688d55c68a195a0
-
SHA512
bb82ae14025eb363bc4cdbbd4ce5522a1e33a2204fb11f93d095db25dfe6dae43666bbc732551ebd7e53cc034191112e0269158649526a2137a7c614d2a0312e
-
SSDEEP
49152:KaSofyDdWWqJHBhgmvQojZ2toFPVmyN8yrOR23P2yYI1N7B5lcdtH9jR9W/KMZKo:LudwBhzQoMtoFPVmyN8yrOR23O8P77lN
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-22_5cd0ff310b46251ac44fde6ec3860f8d_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-22_5cd0ff310b46251ac44fde6ec3860f8d_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
5cd0ff310b46251ac44fde6ec3860f8d
-
SHA1
d0ed680fbcb4bdf79c2c3c9e5d7f47d0835eb635
-
SHA256
2965951d342ac271795613caaf67c157ac5298b943326c567688d55c68a195a0
-
SHA512
bb82ae14025eb363bc4cdbbd4ce5522a1e33a2204fb11f93d095db25dfe6dae43666bbc732551ebd7e53cc034191112e0269158649526a2137a7c614d2a0312e
-
SSDEEP
49152:KaSofyDdWWqJHBhgmvQojZ2toFPVmyN8yrOR23P2yYI1N7B5lcdtH9jR9W/KMZKo:LudwBhzQoMtoFPVmyN8yrOR23O8P77lN
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-