General
-
Target
2025-01-20_8185681e6cdf4cc9ee02d75046cc5e5d_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
250120-lmzw9asqf1
-
MD5
8185681e6cdf4cc9ee02d75046cc5e5d
-
SHA1
b99c6689c77c13f48c74514d19d6531c399fb1dd
-
SHA256
de7f00f21c70428eb02f1099aa93effa6a987343407635a35c7745d155fb78fb
-
SHA512
ab16eeca08532f8392469c170780209966c589de49a3362372461580b9e882abfc802d4572ae432df9fa6983b911bc2f82c0c6dfdf697872819989b85a371367
-
SSDEEP
49152:2Pf6VdMQTIRbg23shkNw//7vgseqziRS1UsrzoeNFZeT5c71y9Bx4M3W/KMZKWKq:2qQRz3ssw//7vgVqziRS1Usrzppc5y1f
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-20_8185681e6cdf4cc9ee02d75046cc5e5d_floxif_hijackloader_mafia.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-01-20_8185681e6cdf4cc9ee02d75046cc5e5d_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
8185681e6cdf4cc9ee02d75046cc5e5d
-
SHA1
b99c6689c77c13f48c74514d19d6531c399fb1dd
-
SHA256
de7f00f21c70428eb02f1099aa93effa6a987343407635a35c7745d155fb78fb
-
SHA512
ab16eeca08532f8392469c170780209966c589de49a3362372461580b9e882abfc802d4572ae432df9fa6983b911bc2f82c0c6dfdf697872819989b85a371367
-
SSDEEP
49152:2Pf6VdMQTIRbg23shkNw//7vgseqziRS1UsrzoeNFZeT5c71y9Bx4M3W/KMZKWKq:2qQRz3ssw//7vgVqziRS1Usrzppc5y1f
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-