General
-
Target
2024-05-17_eb8798404094440620d2d62fc100c687_bkransomware_floxif
-
Size
4.7MB
-
Sample
240517-jkdvwsga7w
-
MD5
eb8798404094440620d2d62fc100c687
-
SHA1
a48645083621196a79286c2005d77c4fd1f1e1fb
-
SHA256
147fbc45cf6f9be8d693fc2673d12ccd039e1c5c8b947be211bc456300472afd
-
SHA512
d9679535a76ae4d7371f8171aefae9ee0799fe7b57ca5697f8b2db1eded1efba344f9a60e4506e1be0fad020a034d757be630e7fc99194ed06e99f76e961bb33
-
SSDEEP
98304:kBe4Il9dRPenSX5gSoC30DHDB1dE46V3u/D:hfNenq38L/D
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-17_eb8798404094440620d2d62fc100c687_bkransomware_floxif.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-17_eb8798404094440620d2d62fc100c687_bkransomware_floxif.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
2024-05-17_eb8798404094440620d2d62fc100c687_bkransomware_floxif
-
Size
4.7MB
-
MD5
eb8798404094440620d2d62fc100c687
-
SHA1
a48645083621196a79286c2005d77c4fd1f1e1fb
-
SHA256
147fbc45cf6f9be8d693fc2673d12ccd039e1c5c8b947be211bc456300472afd
-
SHA512
d9679535a76ae4d7371f8171aefae9ee0799fe7b57ca5697f8b2db1eded1efba344f9a60e4506e1be0fad020a034d757be630e7fc99194ed06e99f76e961bb33
-
SSDEEP
98304:kBe4Il9dRPenSX5gSoC30DHDB1dE46V3u/D:hfNenq38L/D
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-