General

  • Target

    2024-12-18_6e99e48957b47b9dca68f08dcbbfe204_bkransomware_floxif_karagany

  • Size

    149KB

  • Sample

    241218-t4zxksvnd1

  • MD5

    6e99e48957b47b9dca68f08dcbbfe204

  • SHA1

    5e0a2f315e51341d03b84f6f5a09ae0bd06ac46c

  • SHA256

    1f1eb7e95fabf4b7398dd8899a32431e8085c18d293122f1636ed76e8c8da1ca

  • SHA512

    4c3590521c97aef737aeb45c335380f068d0336e674c1218b92ca1fa9885ae70fc5086256a62a8ca187b5bedfec77b3634d77b62c7964fa1c4d1d75d7546854a

  • SSDEEP

    1536:MPIzEO/p38JXZ93r4rW7r4tc+L19sWjcdx8KabTN2s+zheW6BVrqzCJ3bdDY+W1Y:jv8d+L1C6p2lQBV+UdE+rECWp7hKZMWV

Malware Config

Targets

    • Target

      2024-12-18_6e99e48957b47b9dca68f08dcbbfe204_bkransomware_floxif_karagany

    • Size

      149KB

    • MD5

      6e99e48957b47b9dca68f08dcbbfe204

    • SHA1

      5e0a2f315e51341d03b84f6f5a09ae0bd06ac46c

    • SHA256

      1f1eb7e95fabf4b7398dd8899a32431e8085c18d293122f1636ed76e8c8da1ca

    • SHA512

      4c3590521c97aef737aeb45c335380f068d0336e674c1218b92ca1fa9885ae70fc5086256a62a8ca187b5bedfec77b3634d77b62c7964fa1c4d1d75d7546854a

    • SSDEEP

      1536:MPIzEO/p38JXZ93r4rW7r4tc+L19sWjcdx8KabTN2s+zheW6BVrqzCJ3bdDY+W1Y:jv8d+L1C6p2lQBV+UdE+rECWp7hKZMWV

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks