General
-
Target
2025-01-10_1c738b7b519c7dbca8294d06bd7010ba_floxif_hijackloader_mafia
-
Size
562KB
-
Sample
250110-a2qrcayjdp
-
MD5
1c738b7b519c7dbca8294d06bd7010ba
-
SHA1
61553840c0ca01185c7bc2fc42411921aafe6774
-
SHA256
d661eef07c7092cdb4f37d30731390c26b4c7584bdadcbfb583b1ad4dbb04c29
-
SHA512
525fbabc2c0935d4927e601c9bd2b19e6beb02ece209118ccc182481834ff289e19b9f921ef985cbb17bc3dc8894be746a33a267ce13b4fe8dfb0cf4dbe0220d
-
SSDEEP
12288:fnR+T6jdSeQjH7itGl44uSlvdGcwBjvrEH7Ugb:fnR+T6BSeQ7mZZivd4rEH7x
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_1c738b7b519c7dbca8294d06bd7010ba_floxif_hijackloader_mafia.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2025-01-10_1c738b7b519c7dbca8294d06bd7010ba_floxif_hijackloader_mafia
-
Size
562KB
-
MD5
1c738b7b519c7dbca8294d06bd7010ba
-
SHA1
61553840c0ca01185c7bc2fc42411921aafe6774
-
SHA256
d661eef07c7092cdb4f37d30731390c26b4c7584bdadcbfb583b1ad4dbb04c29
-
SHA512
525fbabc2c0935d4927e601c9bd2b19e6beb02ece209118ccc182481834ff289e19b9f921ef985cbb17bc3dc8894be746a33a267ce13b4fe8dfb0cf4dbe0220d
-
SSDEEP
12288:fnR+T6jdSeQjH7itGl44uSlvdGcwBjvrEH7Ugb:fnR+T6BSeQ7mZZivd4rEH7x
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-