General
-
Target
2024-12-29_66186bf3f0afcb2e318a68c89bec0799_floxif_hijackloader_luca-stealer_magniber
-
Size
6.6MB
-
Sample
241229-w4fvtavpev
-
MD5
66186bf3f0afcb2e318a68c89bec0799
-
SHA1
201149b7fc4584df19be2373c78c0b62d05a86b6
-
SHA256
90f86dd8afda8be9c2e60b655bb730384930ec19b31465bdcc48b2108e44f34a
-
SHA512
a3a92de7de02857d675d7f81e6b202286df2aa948284bc113d64365897e9b4d68c6d85f35ca358ececbe9a017d43a3fccc4261de7117597580091a916b6f1cbc
-
SSDEEP
98304:Vzvc3x0eU5N2T3pPB7wwQgy8p6JULNTY+sgrjBhiZUHKRmGO5Z/WtFmf:Jc3fU5NeRFEYNUgraTRm1ZutQ
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-29_66186bf3f0afcb2e318a68c89bec0799_floxif_hijackloader_luca-stealer_magniber.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2024-12-29_66186bf3f0afcb2e318a68c89bec0799_floxif_hijackloader_luca-stealer_magniber.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-29_66186bf3f0afcb2e318a68c89bec0799_floxif_hijackloader_luca-stealer_magniber
-
Size
6.6MB
-
MD5
66186bf3f0afcb2e318a68c89bec0799
-
SHA1
201149b7fc4584df19be2373c78c0b62d05a86b6
-
SHA256
90f86dd8afda8be9c2e60b655bb730384930ec19b31465bdcc48b2108e44f34a
-
SHA512
a3a92de7de02857d675d7f81e6b202286df2aa948284bc113d64365897e9b4d68c6d85f35ca358ececbe9a017d43a3fccc4261de7117597580091a916b6f1cbc
-
SSDEEP
98304:Vzvc3x0eU5N2T3pPB7wwQgy8p6JULNTY+sgrjBhiZUHKRmGO5Z/WtFmf:Jc3fU5NeRFEYNUgraTRm1ZutQ
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-