General
-
Target
2024-11-18_97a4e84a062104032b9180890eafadc3_bkransomware_floxif_hijackloader
-
Size
2.0MB
-
Sample
241118-w6xlcaslcx
-
MD5
97a4e84a062104032b9180890eafadc3
-
SHA1
3b597855ac6e5042fe2766560ead6d94269e2a28
-
SHA256
706f0557855795043944e342f9a9b895bde5862967c4dfe3293e1913329277eb
-
SHA512
8cd7addf0d92a8aadac7a862d9df5308324d266231f9a5ba0e4637d90b4848ac328a22936e1c3aacc4dea4d0c28fdfc099b2a4bc5914acdcb0612ef74b487c19
-
SSDEEP
49152:Dk0eo5nJIioHlq+c6gjR92IISNbecXxHDoaf3M7sSZOZVVNa6ZW:Dk25nHoHlq+c6G92IBRecXxHUaf3M7s+
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-18_97a4e84a062104032b9180890eafadc3_bkransomware_floxif_hijackloader.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-18_97a4e84a062104032b9180890eafadc3_bkransomware_floxif_hijackloader.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-11-18_97a4e84a062104032b9180890eafadc3_bkransomware_floxif_hijackloader
-
Size
2.0MB
-
MD5
97a4e84a062104032b9180890eafadc3
-
SHA1
3b597855ac6e5042fe2766560ead6d94269e2a28
-
SHA256
706f0557855795043944e342f9a9b895bde5862967c4dfe3293e1913329277eb
-
SHA512
8cd7addf0d92a8aadac7a862d9df5308324d266231f9a5ba0e4637d90b4848ac328a22936e1c3aacc4dea4d0c28fdfc099b2a4bc5914acdcb0612ef74b487c19
-
SSDEEP
49152:Dk0eo5nJIioHlq+c6gjR92IISNbecXxHDoaf3M7sSZOZVVNa6ZW:Dk25nHoHlq+c6G92IBRecXxHUaf3M7s+
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-