General
-
Target
2025-03-03_c4d0b88bd3948da824cc6b6346283a0b_floxif_hijackloader_mafia
-
Size
2.7MB
-
Sample
250303-rw2p4azyav
-
MD5
c4d0b88bd3948da824cc6b6346283a0b
-
SHA1
06c7266bea4957e877b4ac90499c2685bdf622ce
-
SHA256
1a6914387221aa49719746ed5c6917f2ae3b8eb204a6d71bd1e5d99c33111528
-
SHA512
b5a097d2c995905e651aab9d84aed071dcf067ac48b311196dd45d00b2b85cd5bae0ba8779397d05fa4ffd34444b28786a69b1bd48829afcc56073b8b48d6530
-
SSDEEP
49152:2Pf6VdMQTNRbg239Nw//7vgseqziRS1UsrzoeNFZeB5c71y9Bx4M3W/KMZKWKKFt:2q1Rz3Xw//7vgVqziRS1Usrzppq5y1yI
Static task
static1
Behavioral task
behavioral1
Sample
2025-03-03_c4d0b88bd3948da824cc6b6346283a0b_floxif_hijackloader_mafia.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-03-03_c4d0b88bd3948da824cc6b6346283a0b_floxif_hijackloader_mafia.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
2025-03-03_c4d0b88bd3948da824cc6b6346283a0b_floxif_hijackloader_mafia
-
Size
2.7MB
-
MD5
c4d0b88bd3948da824cc6b6346283a0b
-
SHA1
06c7266bea4957e877b4ac90499c2685bdf622ce
-
SHA256
1a6914387221aa49719746ed5c6917f2ae3b8eb204a6d71bd1e5d99c33111528
-
SHA512
b5a097d2c995905e651aab9d84aed071dcf067ac48b311196dd45d00b2b85cd5bae0ba8779397d05fa4ffd34444b28786a69b1bd48829afcc56073b8b48d6530
-
SSDEEP
49152:2Pf6VdMQTNRbg239Nw//7vgseqziRS1UsrzoeNFZeB5c71y9Bx4M3W/KMZKWKKFt:2q1Rz3Xw//7vgVqziRS1Usrzppq5y1yI
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-