General
-
Target
2024-06-10_96669ed55032d1b7561e4c35aa39aee9_bkransomware_floxif
-
Size
2.1MB
-
Sample
240610-pvrgmawdkl
-
MD5
96669ed55032d1b7561e4c35aa39aee9
-
SHA1
695e2e2332cfd9cbb459d192b072a5070920db22
-
SHA256
39ba7a38c2b1d26dcfc62ab3eaa087146f5f668aeb87836423512b49b7b9158e
-
SHA512
4a22840c9347ca595b05a87b5fdc733144117a72523947fb11b9030668834446b08fd7db14883efe3c35ea58097488cdbc7f550a6f5d2c59bb95c5ae0e07a48f
-
SSDEEP
49152:/ofqq2msxBMWSARio/D4aQGJ6+Y59N2153nqPk4utu+NNAVw6rPY4:gCq2R3MWSAN/M9GJrYx2r3qPk4utCV1
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-10_96669ed55032d1b7561e4c35aa39aee9_bkransomware_floxif.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-10_96669ed55032d1b7561e4c35aa39aee9_bkransomware_floxif.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
2024-06-10_96669ed55032d1b7561e4c35aa39aee9_bkransomware_floxif
-
Size
2.1MB
-
MD5
96669ed55032d1b7561e4c35aa39aee9
-
SHA1
695e2e2332cfd9cbb459d192b072a5070920db22
-
SHA256
39ba7a38c2b1d26dcfc62ab3eaa087146f5f668aeb87836423512b49b7b9158e
-
SHA512
4a22840c9347ca595b05a87b5fdc733144117a72523947fb11b9030668834446b08fd7db14883efe3c35ea58097488cdbc7f550a6f5d2c59bb95c5ae0e07a48f
-
SSDEEP
49152:/ofqq2msxBMWSARio/D4aQGJ6+Y59N2153nqPk4utu+NNAVw6rPY4:gCq2R3MWSAN/M9GJrYx2r3qPk4utCV1
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-