General
-
Target
2024-12-24_14d39445782a60775819554fa596cdde_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
241224-pjw8qsxkgs
-
MD5
14d39445782a60775819554fa596cdde
-
SHA1
5c6887934afec72617209ca14a2855f3faa9cec4
-
SHA256
57e2800fbad2b2f36561a72b4feebf25e67897309afb459242434c7c653c0f0a
-
SHA512
9af4db0590ff28efcf62302d03a3ad0b99090e26e35470e5da2ce34259157b3153390e897b5ce4c9708614e7c8aa436bb1d7de41a4a8a2d17fba0e563c28106f
-
SSDEEP
49152:KIGYB+v+ta6viBRbJXQv+Tatqc5djUW5SwFAvhDzaDrhFmASRcnZPCCGiPxe7W/b:K6TKB/AGKqc5djUW5jFAvBODyRAZPCCX
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-24_14d39445782a60775819554fa596cdde_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-24_14d39445782a60775819554fa596cdde_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
14d39445782a60775819554fa596cdde
-
SHA1
5c6887934afec72617209ca14a2855f3faa9cec4
-
SHA256
57e2800fbad2b2f36561a72b4feebf25e67897309afb459242434c7c653c0f0a
-
SHA512
9af4db0590ff28efcf62302d03a3ad0b99090e26e35470e5da2ce34259157b3153390e897b5ce4c9708614e7c8aa436bb1d7de41a4a8a2d17fba0e563c28106f
-
SSDEEP
49152:KIGYB+v+ta6viBRbJXQv+Tatqc5djUW5SwFAvhDzaDrhFmASRcnZPCCGiPxe7W/b:K6TKB/AGKqc5djUW5jFAvBODyRAZPCCX
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-