General
-
Target
2024-12-10_5c33d0684927b54587e18f002eba40c1_bkransomware_floxif
-
Size
4.7MB
-
Sample
241210-jdn3aatnfm
-
MD5
5c33d0684927b54587e18f002eba40c1
-
SHA1
c29369056295a77d6422c8898361d55f1ba5c44d
-
SHA256
33e347afd07325d3d0ab0cd2ba17db5bddb4997f090753fb59f5ba75f5fc3c96
-
SHA512
39af66ad13ea8feda55763361473403ea526402235636c9d01b36fa372b35f8ecc8bd382286bf081cce2baec0303afd26542c5a6e20e95c45c0ef4644b8c79b2
-
SSDEEP
98304:kBe40bl9dRPenSX5gSoCi0DHV1dE46V3u/f:h3NenqioL/f
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-10_5c33d0684927b54587e18f002eba40c1_bkransomware_floxif.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-12-10_5c33d0684927b54587e18f002eba40c1_bkransomware_floxif
-
Size
4.7MB
-
MD5
5c33d0684927b54587e18f002eba40c1
-
SHA1
c29369056295a77d6422c8898361d55f1ba5c44d
-
SHA256
33e347afd07325d3d0ab0cd2ba17db5bddb4997f090753fb59f5ba75f5fc3c96
-
SHA512
39af66ad13ea8feda55763361473403ea526402235636c9d01b36fa372b35f8ecc8bd382286bf081cce2baec0303afd26542c5a6e20e95c45c0ef4644b8c79b2
-
SSDEEP
98304:kBe40bl9dRPenSX5gSoCi0DHV1dE46V3u/f:h3NenqioL/f
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-