General
-
Target
2024-12-20_06e4c00a7930bed72d28d32592b5c908_bkransomware_floxif
-
Size
4.7MB
-
Sample
241220-kjzlmstpf1
-
MD5
06e4c00a7930bed72d28d32592b5c908
-
SHA1
c13c125f76e52c2d979706d730fad6b58ed67406
-
SHA256
2bfb82a8c64cafabfbbe50fa95781c1fcda2294ead0fb0dc7a2b87ca118cac48
-
SHA512
f51af39a10f20b181207f9bd0987cb20cff013ea7fc303f69de6cd70314c3088c9cf80b8e5ad08dd5829c81afe1b7b9d19ba97abbf3fcff19d1bb752d07d4e3d
-
SSDEEP
98304:tBe40bl9dRPenSX5gSoCC0DHDB1dE46V3u/s:a3NenqC8L/s
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-20_06e4c00a7930bed72d28d32592b5c908_bkransomware_floxif.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
2024-12-20_06e4c00a7930bed72d28d32592b5c908_bkransomware_floxif
-
Size
4.7MB
-
MD5
06e4c00a7930bed72d28d32592b5c908
-
SHA1
c13c125f76e52c2d979706d730fad6b58ed67406
-
SHA256
2bfb82a8c64cafabfbbe50fa95781c1fcda2294ead0fb0dc7a2b87ca118cac48
-
SHA512
f51af39a10f20b181207f9bd0987cb20cff013ea7fc303f69de6cd70314c3088c9cf80b8e5ad08dd5829c81afe1b7b9d19ba97abbf3fcff19d1bb752d07d4e3d
-
SSDEEP
98304:tBe40bl9dRPenSX5gSoCC0DHDB1dE46V3u/s:a3NenqC8L/s
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-