General
-
Target
2025-02-08_0bacd8621b781a35693e3f23ef8cb423_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
250208-plsy4awkbr
-
MD5
0bacd8621b781a35693e3f23ef8cb423
-
SHA1
94d6637ca3e75f659e5a74e9bf1f89b354119c30
-
SHA256
e15a34af8596dbb3b4f88968bbf6e892a1f193abf5906fb26c0e7c2d9ccdf9a1
-
SHA512
044888be9caa25dfa923f1fa4d66985b9175a83512779b4ef46fda33663f6dd5d695f8091085a0a025ad88a3993e028409b24120776f9e2c90c57e38529e73f1
-
SSDEEP
49152:2Pf6VdMQTNRbc3shkNw//7vgseqziRS1UsrzoeNFZe05c71y9Bx4M3W/KMZKWKKT:2q1R43ssw//7vgVqziRS1Usrzppv5y1N
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-08_0bacd8621b781a35693e3f23ef8cb423_floxif_hijackloader_mafia.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2025-02-08_0bacd8621b781a35693e3f23ef8cb423_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
0bacd8621b781a35693e3f23ef8cb423
-
SHA1
94d6637ca3e75f659e5a74e9bf1f89b354119c30
-
SHA256
e15a34af8596dbb3b4f88968bbf6e892a1f193abf5906fb26c0e7c2d9ccdf9a1
-
SHA512
044888be9caa25dfa923f1fa4d66985b9175a83512779b4ef46fda33663f6dd5d695f8091085a0a025ad88a3993e028409b24120776f9e2c90c57e38529e73f1
-
SSDEEP
49152:2Pf6VdMQTNRbc3shkNw//7vgseqziRS1UsrzoeNFZe05c71y9Bx4M3W/KMZKWKKT:2q1R43ssw//7vgVqziRS1Usrzppv5y1N
-
Floxif family
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-