General
-
Target
2024-06-16_2d0e8dda6deb8658f780c8b7aeee8211_bkransomware_floxif
-
Size
4.7MB
-
Sample
240616-g9mg8ashle
-
MD5
2d0e8dda6deb8658f780c8b7aeee8211
-
SHA1
51850ac5f72f304c40f0a8a0a8cd43cd747dc213
-
SHA256
c54bf01b05d333df051d86a4520ef8c40c29513f5c257e10e67f42b5a8c3bcbb
-
SHA512
85c519c196bb7987988cb63deb30ba273ec7f25ee866875cca7db0300bf6432ce9acae657d13e554b868c2c5a562164c896f839649675740774d53425bfafa31
-
SSDEEP
98304:kBe40bl9dRPenSw5gSoCs0DHDB1dE46V3u/n:h3NenBs8L/n
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-16_2d0e8dda6deb8658f780c8b7aeee8211_bkransomware_floxif.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-16_2d0e8dda6deb8658f780c8b7aeee8211_bkransomware_floxif.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-16_2d0e8dda6deb8658f780c8b7aeee8211_bkransomware_floxif
-
Size
4.7MB
-
MD5
2d0e8dda6deb8658f780c8b7aeee8211
-
SHA1
51850ac5f72f304c40f0a8a0a8cd43cd747dc213
-
SHA256
c54bf01b05d333df051d86a4520ef8c40c29513f5c257e10e67f42b5a8c3bcbb
-
SHA512
85c519c196bb7987988cb63deb30ba273ec7f25ee866875cca7db0300bf6432ce9acae657d13e554b868c2c5a562164c896f839649675740774d53425bfafa31
-
SSDEEP
98304:kBe40bl9dRPenSw5gSoCs0DHDB1dE46V3u/n:h3NenBs8L/n
Score9/10-
UPX dump on OEP (original entry point)
-
Modifies AppInit DLL entries
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-