General
-
Target
2024-12-17_b1cd90e9fe382f483aabfebed44f75de_bkransomware_floxif_hijackloader
-
Size
14.4MB
-
Sample
241217-pv3vnazqek
-
MD5
b1cd90e9fe382f483aabfebed44f75de
-
SHA1
0a7b2ea127c40968aa4802b46ddcbcb8985c68c1
-
SHA256
5a650596a18ba8f2b37eb09613542fe857f7d717e374dbe970c976933d38a38d
-
SHA512
54e04e524e12a8d589ea329dfaf79d8431256e07b62173a6731e5d0d0f46af5b7694bcd27420e7247d095a671498e0a0f40091a18b17af19624f2282f9654a7f
-
SSDEEP
98304:8TxtQIZETGdOfW0+bs0ZmjBjcaw2lsuze/iBXsLVMZHvOyGCPvPZZDByQNdXCd07:8Xt30t0u/Zk25XCd0LWkVgeXS8
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-17_b1cd90e9fe382f483aabfebed44f75de_bkransomware_floxif_hijackloader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-17_b1cd90e9fe382f483aabfebed44f75de_bkransomware_floxif_hijackloader
-
Size
14.4MB
-
MD5
b1cd90e9fe382f483aabfebed44f75de
-
SHA1
0a7b2ea127c40968aa4802b46ddcbcb8985c68c1
-
SHA256
5a650596a18ba8f2b37eb09613542fe857f7d717e374dbe970c976933d38a38d
-
SHA512
54e04e524e12a8d589ea329dfaf79d8431256e07b62173a6731e5d0d0f46af5b7694bcd27420e7247d095a671498e0a0f40091a18b17af19624f2282f9654a7f
-
SSDEEP
98304:8TxtQIZETGdOfW0+bs0ZmjBjcaw2lsuze/iBXsLVMZHvOyGCPvPZZDByQNdXCd07:8Xt30t0u/Zk25XCd0LWkVgeXS8
-
Floxif family
-
Detects Floxif payload
-
A potential corporate email address has been identified in the URL: [email protected]
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1