General
-
Target
2024-09-05_b19c0ffd7010f0895b5db0dee838ce1d_bkransomware_floxif
-
Size
2.1MB
-
Sample
240905-psth7s1brk
-
MD5
b19c0ffd7010f0895b5db0dee838ce1d
-
SHA1
8ba0d27dd24cc0c65673453b12a7b8f471c8920e
-
SHA256
b989196a6f6166a30bc3df0ee3f7bf61bd3afcba193ceafbd16c5ac45b5f3609
-
SHA512
7068d717e4f1cc12f0601bfce27b86f0a932ecc854a958d342f1344e9a47867a525bb9813d31866c4acb1e7d725861adc673a49736268bd7bc377c4fded5b9fb
-
SSDEEP
49152:/ofqq2msxBMfSxRio/D4aQGJ6+Y59N2153kqPk4utu+NNAVw6rPYA:gCq2R3MfSxN/M9GJrYx2r3vPk4utCVZ
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-05_b19c0ffd7010f0895b5db0dee838ce1d_bkransomware_floxif.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-09-05_b19c0ffd7010f0895b5db0dee838ce1d_bkransomware_floxif
-
Size
2.1MB
-
MD5
b19c0ffd7010f0895b5db0dee838ce1d
-
SHA1
8ba0d27dd24cc0c65673453b12a7b8f471c8920e
-
SHA256
b989196a6f6166a30bc3df0ee3f7bf61bd3afcba193ceafbd16c5ac45b5f3609
-
SHA512
7068d717e4f1cc12f0601bfce27b86f0a932ecc854a958d342f1344e9a47867a525bb9813d31866c4acb1e7d725861adc673a49736268bd7bc377c4fded5b9fb
-
SSDEEP
49152:/ofqq2msxBMfSxRio/D4aQGJ6+Y59N2153kqPk4utu+NNAVw6rPYA:gCq2R3MfSxN/M9GJrYx2r3vPk4utCVZ
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-