General
-
Target
2025-02-02_1bc4f2e96e4d4ef08652d1fbcc147e7d_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
250202-rrxwcaxnfp
-
MD5
1bc4f2e96e4d4ef08652d1fbcc147e7d
-
SHA1
2e371b3ed26af772c9fd0dca4b875e82fc1da938
-
SHA256
7a35e9c17e696375f453716f3043a10f0d84acda09a5a1b20d777689033dacbb
-
SHA512
a78b8a4536d388bcbbb54fb190c2d3aa14286d75dc82c633e4633572c0e02eb0909c69c79ff30172bbd5c9afe32d2db447e8fb2795835804ea27f93e700921f1
-
SSDEEP
49152:2Pf6VdMQTNRbg2GhkNw//7vgseqziRS1UsrzoeNFZeD5c71y9Bx4M3W/KMZKWKKf:2q1RzGsw//7vgVqziRS1Usrzpp05y1yU
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_1bc4f2e96e4d4ef08652d1fbcc147e7d_floxif_hijackloader_mafia.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2025-02-02_1bc4f2e96e4d4ef08652d1fbcc147e7d_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
1bc4f2e96e4d4ef08652d1fbcc147e7d
-
SHA1
2e371b3ed26af772c9fd0dca4b875e82fc1da938
-
SHA256
7a35e9c17e696375f453716f3043a10f0d84acda09a5a1b20d777689033dacbb
-
SHA512
a78b8a4536d388bcbbb54fb190c2d3aa14286d75dc82c633e4633572c0e02eb0909c69c79ff30172bbd5c9afe32d2db447e8fb2795835804ea27f93e700921f1
-
SSDEEP
49152:2Pf6VdMQTNRbg2GhkNw//7vgseqziRS1UsrzoeNFZeD5c71y9Bx4M3W/KMZKWKKf:2q1RzGsw//7vgVqziRS1Usrzpp05y1yU
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-