General
-
Target
2025-04-03_d3476fcabe9b55db4444e8f8ceb80021_amadey_floxif_hijackloader_ngrbot_remcos_rhadamanthys_smoke-loader_swisyn
-
Size
11.9MB
-
Sample
250403-vm8ntsspw5
-
MD5
d3476fcabe9b55db4444e8f8ceb80021
-
SHA1
7a7ff13697e79cb389fc3bca78a002f1e19e83ab
-
SHA256
e916d3d1bd3b910338339aeb00fc1c82a01ade79c9630e3efa9a478bbede50ab
-
SHA512
b2c2db28d3e89ecdfad7c735d62eafcba3ff54034f0f636dd2fe12e60e4fc79d8769b2d13041b095401dc25d9cf4c1b168550ef11df1865f003ad907901989c3
-
SSDEEP
196608:KMFo0ab2MnxuUfkBfoz17N/e/AmdAPJ1KpvGkKQMfKIfBAN/CIQm3EY:FKHb2MnxumkOz17N/EA3J14+kKQMfKIu
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_d3476fcabe9b55db4444e8f8ceb80021_amadey_floxif_hijackloader_ngrbot_remcos_rhadamanthys_smoke-loader_swisyn.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-03_d3476fcabe9b55db4444e8f8ceb80021_amadey_floxif_hijackloader_ngrbot_remcos_rhadamanthys_smoke-loader_swisyn
-
Size
11.9MB
-
MD5
d3476fcabe9b55db4444e8f8ceb80021
-
SHA1
7a7ff13697e79cb389fc3bca78a002f1e19e83ab
-
SHA256
e916d3d1bd3b910338339aeb00fc1c82a01ade79c9630e3efa9a478bbede50ab
-
SHA512
b2c2db28d3e89ecdfad7c735d62eafcba3ff54034f0f636dd2fe12e60e4fc79d8769b2d13041b095401dc25d9cf4c1b168550ef11df1865f003ad907901989c3
-
SSDEEP
196608:KMFo0ab2MnxuUfkBfoz17N/e/AmdAPJ1KpvGkKQMfKIfBAN/CIQm3EY:FKHb2MnxumkOz17N/EA3J14+kKQMfKIu
-
Floxif family
-
Modifies visiblity of hidden/system files in Explorer
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2