General
-
Target
2025-01-08_bb4d61c4d48e69571f30d6893c36bb15_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
250108-hbb49sxrg1
-
MD5
bb4d61c4d48e69571f30d6893c36bb15
-
SHA1
151e7ed01dbc176d5d296611a1de7eb7419fde26
-
SHA256
1a6dfc165a1475624da70dd3370f386cb7aa2cec23c7b9fc44fa2c9a18cc8aaa
-
SHA512
d3c82ae82785b3db5af635c98badcb22425aa22f5f2a648381a555214698e6eb8301c123c7506b862a4fe8af24197d3eaefa50b422f8d9283a9d87f6c2cd9008
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTpu9FlNN7boUvH6u//zHHwhXPwMQ9i9ZMW/KMZKy:/n6r6+0FUFIIsTQ9Fl/7boUi+TwZPwMV
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-08_bb4d61c4d48e69571f30d6893c36bb15_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-08_bb4d61c4d48e69571f30d6893c36bb15_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
bb4d61c4d48e69571f30d6893c36bb15
-
SHA1
151e7ed01dbc176d5d296611a1de7eb7419fde26
-
SHA256
1a6dfc165a1475624da70dd3370f386cb7aa2cec23c7b9fc44fa2c9a18cc8aaa
-
SHA512
d3c82ae82785b3db5af635c98badcb22425aa22f5f2a648381a555214698e6eb8301c123c7506b862a4fe8af24197d3eaefa50b422f8d9283a9d87f6c2cd9008
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTpu9FlNN7boUvH6u//zHHwhXPwMQ9i9ZMW/KMZKy:/n6r6+0FUFIIsTQ9Fl/7boUi+TwZPwMV
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-