General
-
Target
2025-04-03_d00ce1ff979ee2db88eb9bda7fef8543_amadey_floxif_hijackloader_smoke-loader
-
Size
5.3MB
-
Sample
250403-zzd27swqx2
-
MD5
d00ce1ff979ee2db88eb9bda7fef8543
-
SHA1
fe93ebf6ee820cdb81a87d46bac70552ff993ed7
-
SHA256
76eb82d7abfae7bfdaf90ca991fb182a5236dce31b9719e9e1f56cac23ad910d
-
SHA512
9d67c5d423c9c7e7e263fdfcdfd0e5d8890dfa3b0ad3da1f75b07ee3014c0b1ca8da3b44b9b73a64bfad239177f1c6d4d369b9df455f79961cd2c5dc832319cf
-
SSDEEP
98304:Y6mPeo1/dqYynx4Yocs0CU5iBWjnQ6jEoSKvQn0:Yl2oiBGYNs0CU5jnvZu0
Static task
static1
Malware Config
Targets
-
-
Target
2025-04-03_d00ce1ff979ee2db88eb9bda7fef8543_amadey_floxif_hijackloader_smoke-loader
-
Size
5.3MB
-
MD5
d00ce1ff979ee2db88eb9bda7fef8543
-
SHA1
fe93ebf6ee820cdb81a87d46bac70552ff993ed7
-
SHA256
76eb82d7abfae7bfdaf90ca991fb182a5236dce31b9719e9e1f56cac23ad910d
-
SHA512
9d67c5d423c9c7e7e263fdfcdfd0e5d8890dfa3b0ad3da1f75b07ee3014c0b1ca8da3b44b9b73a64bfad239177f1c6d4d369b9df455f79961cd2c5dc832319cf
-
SSDEEP
98304:Y6mPeo1/dqYynx4Yocs0CU5iBWjnQ6jEoSKvQn0:Yl2oiBGYNs0CU5jnvZu0
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-