General
-
Target
2025-01-08_42b4f8036856445aa4965e1adab36b48_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
250108-jmnswasqcq
-
MD5
42b4f8036856445aa4965e1adab36b48
-
SHA1
d2d615225ce18cc0368af60485630f7f750bdf1a
-
SHA256
d216cf1d5c8f6450dcd133ec67051ccc3b11477c21981f234e3f94107ebecc48
-
SHA512
c76ad783699d9d058a540009ee0963ac73b5c2bffcb5001ecec0559630ff683eb774c454d449be4c8e2a43a362a3a8d395e63af67c4efa46d5abd81b148787de
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7boUHH6u//zHiwhXPwMQ9i9ZMW/KMZKK:/n6r6+0FUFIIsTY9Fl/7boU6+WwZPwMR
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-08_42b4f8036856445aa4965e1adab36b48_floxif_hijackloader_mafia.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-08_42b4f8036856445aa4965e1adab36b48_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
42b4f8036856445aa4965e1adab36b48
-
SHA1
d2d615225ce18cc0368af60485630f7f750bdf1a
-
SHA256
d216cf1d5c8f6450dcd133ec67051ccc3b11477c21981f234e3f94107ebecc48
-
SHA512
c76ad783699d9d058a540009ee0963ac73b5c2bffcb5001ecec0559630ff683eb774c454d449be4c8e2a43a362a3a8d395e63af67c4efa46d5abd81b148787de
-
SSDEEP
49152:Flks4A6lVLX6Sc60FNUFFIIsTp69FlNN7boUHH6u//zHiwhXPwMQ9i9ZMW/KMZKK:/n6r6+0FUFIIsTY9Fl/7boU6+WwZPwMR
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-