General

  • Target

    2024-12-15_1be18e1bdac187039a5d62da49bf54cd_bkransomware_floxif

  • Size

    2.3MB

  • Sample

    241215-pl7r9atpby

  • MD5

    1be18e1bdac187039a5d62da49bf54cd

  • SHA1

    c776ed4550bdc869ae594d4a2443f1c25e2a80a6

  • SHA256

    d618984f7ba92af0aa57fff1439d75a531b894501c46dd2b55d3d9a2743c84c7

  • SHA512

    6a7cf759c5ca3e512c16eebce656e96b8093f0ac73a2de797e5e80316d14fdf4f70e619708ccbb3f38d0ad410f339d99606f3873349ce3337292d71b1dd90dba

  • SSDEEP

    49152:5Jyuu74d5rn0TsHx81j9MzvAPaGBRTUs5UFlm7k5wcQlFNjiH1QaC6NxM8:VPn0oHx81j9MzSLZUs5UFlm7k5BQRjix

Malware Config

Targets

    • Target

      2024-12-15_1be18e1bdac187039a5d62da49bf54cd_bkransomware_floxif

    • Size

      2.3MB

    • MD5

      1be18e1bdac187039a5d62da49bf54cd

    • SHA1

      c776ed4550bdc869ae594d4a2443f1c25e2a80a6

    • SHA256

      d618984f7ba92af0aa57fff1439d75a531b894501c46dd2b55d3d9a2743c84c7

    • SHA512

      6a7cf759c5ca3e512c16eebce656e96b8093f0ac73a2de797e5e80316d14fdf4f70e619708ccbb3f38d0ad410f339d99606f3873349ce3337292d71b1dd90dba

    • SSDEEP

      49152:5Jyuu74d5rn0TsHx81j9MzvAPaGBRTUs5UFlm7k5wcQlFNjiH1QaC6NxM8:VPn0oHx81j9MzSLZUs5UFlm7k5BQRjix

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks