General
-
Target
2024-12-11_c80a965ec70b67ea20dbcb52c771f37c_bkransomware_floxif
-
Size
4.7MB
-
Sample
241211-me8d4asren
-
MD5
c80a965ec70b67ea20dbcb52c771f37c
-
SHA1
e04e474599790e5158694c26d4b0b4c5441f071b
-
SHA256
0eae9adf9ba773abfab45381da9868803af8ddb051816b05c86ad32471129d11
-
SHA512
d2c5b3afd746a9ad00c03dbf3431c727efb30b5602c7a128c14810f3159488c733f42276993b353c019c19e260192fd1ed37ef77dcb422712429bc4f8e16eac9
-
SSDEEP
98304:kBe40bl9dRPenSX5gSBC60DHDB1dE46V3u/r:h3Nenb68L/r
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-11_c80a965ec70b67ea20dbcb52c771f37c_bkransomware_floxif.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-12-11_c80a965ec70b67ea20dbcb52c771f37c_bkransomware_floxif
-
Size
4.7MB
-
MD5
c80a965ec70b67ea20dbcb52c771f37c
-
SHA1
e04e474599790e5158694c26d4b0b4c5441f071b
-
SHA256
0eae9adf9ba773abfab45381da9868803af8ddb051816b05c86ad32471129d11
-
SHA512
d2c5b3afd746a9ad00c03dbf3431c727efb30b5602c7a128c14810f3159488c733f42276993b353c019c19e260192fd1ed37ef77dcb422712429bc4f8e16eac9
-
SSDEEP
98304:kBe40bl9dRPenSX5gSBC60DHDB1dE46V3u/r:h3Nenb68L/r
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-