General
-
Target
2024-12-25_6db07c08ff234dc08ce7563cd21cb6cc_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
241225-pl27rsspdt
-
MD5
6db07c08ff234dc08ce7563cd21cb6cc
-
SHA1
a919ab57cb2935dd6ec373f6048dce4c78bdec76
-
SHA256
96e4887c1d19ce488ca50602eee8d2031eb687c09731b2a90033a082d7bd0593
-
SHA512
586d6f2720342673b4335557a3089a84c893bab1a02550366f139704de934453221edeef126815ad146ae0372198aa7893e7c8c1e96cda389a79388bf00d44e1
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7IoUvH6u//zH4whXPwMQ9i9ZMW/KMZKc:/n6r6+0FUFIIsTY9Fl/7IoUi+0wZPwMf
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_6db07c08ff234dc08ce7563cd21cb6cc_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-25_6db07c08ff234dc08ce7563cd21cb6cc_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
6db07c08ff234dc08ce7563cd21cb6cc
-
SHA1
a919ab57cb2935dd6ec373f6048dce4c78bdec76
-
SHA256
96e4887c1d19ce488ca50602eee8d2031eb687c09731b2a90033a082d7bd0593
-
SHA512
586d6f2720342673b4335557a3089a84c893bab1a02550366f139704de934453221edeef126815ad146ae0372198aa7893e7c8c1e96cda389a79388bf00d44e1
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7IoUvH6u//zH4whXPwMQ9i9ZMW/KMZKc:/n6r6+0FUFIIsTY9Fl/7IoUi+0wZPwMf
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-