General
-
Target
2024-09-13_cc6f199a6f24d777c2c7bd7c1d72de39_bkransomware_floxif
-
Size
2.3MB
-
Sample
240913-qsz7essekr
-
MD5
cc6f199a6f24d777c2c7bd7c1d72de39
-
SHA1
bfe10a90fb92d37bf2f32a911cf64c289dbe1e50
-
SHA256
6762027dd091793e85a117a814dcefceccbb2f762c8c6c8f0f67f8c2152d4b83
-
SHA512
3bb8db434092d11de6dfde4ca9d2e3c377378d45e85f6569430b048dcb58a818dc30b0c2c585a1e79e34a680c8911f2095ae68f8073b5e2f00a5b59192508bc3
-
SSDEEP
49152:1g4/fb0T3hlfNIbJy1m3a2bhwM1BPP2q0qzlB/8zIaySwzKXFr7fJv5t:bfEh9NIdy1BEwMjuq0qzlB/kIaySOKXD
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_cc6f199a6f24d777c2c7bd7c1d72de39_bkransomware_floxif.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-09-13_cc6f199a6f24d777c2c7bd7c1d72de39_bkransomware_floxif
-
Size
2.3MB
-
MD5
cc6f199a6f24d777c2c7bd7c1d72de39
-
SHA1
bfe10a90fb92d37bf2f32a911cf64c289dbe1e50
-
SHA256
6762027dd091793e85a117a814dcefceccbb2f762c8c6c8f0f67f8c2152d4b83
-
SHA512
3bb8db434092d11de6dfde4ca9d2e3c377378d45e85f6569430b048dcb58a818dc30b0c2c585a1e79e34a680c8911f2095ae68f8073b5e2f00a5b59192508bc3
-
SSDEEP
49152:1g4/fb0T3hlfNIbJy1m3a2bhwM1BPP2q0qzlB/8zIaySwzKXFr7fJv5t:bfEh9NIdy1BEwMjuq0qzlB/kIaySOKXD
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-