General
-
Target
2024-12-25_3f7cb137034936e5360e167676f4b16f_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
241225-pllvsaspbz
-
MD5
3f7cb137034936e5360e167676f4b16f
-
SHA1
5f51a04bd64f79074725f7c278569ee6bfab1040
-
SHA256
dc589d4819806f288fd24635efcb65b2664da3634193cd333bba1599f170991b
-
SHA512
d0a712ec53196f53b4bb54874a80820af48e3b692ef4dd78c649c4527ebac0913fb4e18eeef8fe19895c863f500b893a633d3534b1ce5719d0a0352e543bb5db
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7boTvH6u//zHIwhXPwMQ9i9ZMW/KMZK5:/n6r6+0FUFIIsTY9Fl/7boTi+8wZPwMG
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-25_3f7cb137034936e5360e167676f4b16f_floxif_hijackloader_mafia.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-12-25_3f7cb137034936e5360e167676f4b16f_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
3f7cb137034936e5360e167676f4b16f
-
SHA1
5f51a04bd64f79074725f7c278569ee6bfab1040
-
SHA256
dc589d4819806f288fd24635efcb65b2664da3634193cd333bba1599f170991b
-
SHA512
d0a712ec53196f53b4bb54874a80820af48e3b692ef4dd78c649c4527ebac0913fb4e18eeef8fe19895c863f500b893a633d3534b1ce5719d0a0352e543bb5db
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7boTvH6u//zHIwhXPwMQ9i9ZMW/KMZK5:/n6r6+0FUFIIsTY9Fl/7boTi+8wZPwMG
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-