General
-
Target
2025-04-03_f648e21e939d0a1b85e0cc06fc030ed0_amadey_floxif_smoke-loader
-
Size
3.9MB
-
Sample
250403-wte6jatqx9
-
MD5
f648e21e939d0a1b85e0cc06fc030ed0
-
SHA1
59760c8b0fb7d87768562ce46ecbc3722c3a4afa
-
SHA256
26b05b65a810084a62fd6c0119b07ba2d55450af656db8eb31d8c28e37df2790
-
SHA512
5793e7672da8e81d3bef8ab33da555fdcd5cd97c8356e16c8bef6df6c9ec196323653c0ff3a11fdaa79d24283c40572b0d144531492afccb8191edba7ebc55f9
-
SSDEEP
49152:yxvDiYlx4hrTQkHsZl3YbXx4hOrjWEKjaL6c5v4psztgWZRCrZlsV:49gTQkHsZl3YrxZrjWEMyv4yBjP
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-03_f648e21e939d0a1b85e0cc06fc030ed0_amadey_floxif_smoke-loader.exe
Resource
win10v2004-20250313-en
Malware Config
Targets
-
-
Target
2025-04-03_f648e21e939d0a1b85e0cc06fc030ed0_amadey_floxif_smoke-loader
-
Size
3.9MB
-
MD5
f648e21e939d0a1b85e0cc06fc030ed0
-
SHA1
59760c8b0fb7d87768562ce46ecbc3722c3a4afa
-
SHA256
26b05b65a810084a62fd6c0119b07ba2d55450af656db8eb31d8c28e37df2790
-
SHA512
5793e7672da8e81d3bef8ab33da555fdcd5cd97c8356e16c8bef6df6c9ec196323653c0ff3a11fdaa79d24283c40572b0d144531492afccb8191edba7ebc55f9
-
SSDEEP
49152:yxvDiYlx4hrTQkHsZl3YbXx4hOrjWEKjaL6c5v4psztgWZRCrZlsV:49gTQkHsZl3YrxZrjWEMyv4yBjP
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-