General
-
Target
2025-01-20_ecbc4163d214d1e8dadb16e308c98af8_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
250120-lnj77atkaj
-
MD5
ecbc4163d214d1e8dadb16e308c98af8
-
SHA1
f3e6447e21036cf076852917d1859f9968b6e435
-
SHA256
39b3c920a050608d81d404f5150835d8b6a954d8b61997fee152b387c8465aa9
-
SHA512
74381ef9f210f2521731997608d1b483eb945580eda0648a7df45e65c96ceddf4fe8765d674a7b75d778c93aa7e2986355d295128d43cb50c9570ee5e872f960
-
SSDEEP
49152:2Pf6VdMQTNRbg20shkNw//7vgseqziRS1UsrzoeNFZer5c71y9Bx4M3W/KMZKWKu:2q1Rz0ssw//7vgVqziRS1UsrzppA5y1/
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-20_ecbc4163d214d1e8dadb16e308c98af8_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-20_ecbc4163d214d1e8dadb16e308c98af8_floxif_hijackloader_mafia.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-20_ecbc4163d214d1e8dadb16e308c98af8_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
ecbc4163d214d1e8dadb16e308c98af8
-
SHA1
f3e6447e21036cf076852917d1859f9968b6e435
-
SHA256
39b3c920a050608d81d404f5150835d8b6a954d8b61997fee152b387c8465aa9
-
SHA512
74381ef9f210f2521731997608d1b483eb945580eda0648a7df45e65c96ceddf4fe8765d674a7b75d778c93aa7e2986355d295128d43cb50c9570ee5e872f960
-
SSDEEP
49152:2Pf6VdMQTNRbg20shkNw//7vgseqziRS1UsrzoeNFZer5c71y9Bx4M3W/KMZKWKu:2q1Rz0ssw//7vgVqziRS1UsrzppA5y1/
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-