General
-
Target
2025-04-23_2a3f18f950829b08f9bcaace109f9ee2_amadey_elex_floxif_hijackloader_smoke-loader
-
Size
1.2MB
-
Sample
250423-w112ksv1gw
-
MD5
2a3f18f950829b08f9bcaace109f9ee2
-
SHA1
c4ca3836fe4dc6755b6b3d0dc22c9869c4c74d88
-
SHA256
4ebd00b0abe31709be9aaf83a5853f08e84be108b7ef0079e18db012c014bb47
-
SHA512
f4aabd53ffbc0a33ad6e07153913b56dd3daf902d2af4bef8b2ca2d40e0d1a12a34b8742a355635aefed8bb58c9268d6ef4160730c65b798e6593ca3756df32f
-
SSDEEP
6144:G6LuJ7AaENSMZL5i+CbImm8SD0p7BoXaK1WcAdr5BV+UdvrEFp7hKi4HASh:G6ZSmU3bDp72VWcAJ5BjvrEH7aASh
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-23_2a3f18f950829b08f9bcaace109f9ee2_amadey_elex_floxif_hijackloader_smoke-loader.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-23_2a3f18f950829b08f9bcaace109f9ee2_amadey_elex_floxif_hijackloader_smoke-loader
-
Size
1.2MB
-
MD5
2a3f18f950829b08f9bcaace109f9ee2
-
SHA1
c4ca3836fe4dc6755b6b3d0dc22c9869c4c74d88
-
SHA256
4ebd00b0abe31709be9aaf83a5853f08e84be108b7ef0079e18db012c014bb47
-
SHA512
f4aabd53ffbc0a33ad6e07153913b56dd3daf902d2af4bef8b2ca2d40e0d1a12a34b8742a355635aefed8bb58c9268d6ef4160730c65b798e6593ca3756df32f
-
SSDEEP
6144:G6LuJ7AaENSMZL5i+CbImm8SD0p7BoXaK1WcAdr5BV+UdvrEFp7hKi4HASh:G6ZSmU3bDp72VWcAJ5BjvrEH7aASh
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1AppInit DLLs
1