General
-
Target
2024-12-21_b636e73643ebae232f5e13e5ac0fcfd5_bkransomware_floxif
-
Size
2.1MB
-
Sample
241221-aqhatsxnhv
-
MD5
b636e73643ebae232f5e13e5ac0fcfd5
-
SHA1
02d28009b3dbb0455ba08ce02c6f77bc7206b84a
-
SHA256
89ab86eaec380069331f01ac9f08dbc91da45885e88a6b43d5b607470e0095d2
-
SHA512
64c14bd4bca89b029a32177d6f93b5c333c0c7782b8fa4fcf716ca451239a22f0e5bfeaf4e85387df32aa933252b23368add0280c94b42918b581deff10fe9f6
-
SSDEEP
49152:o2K/LZO2tGJln45YUgtlS3TiiPs46ypqhLivB9k91b:sLZO2tKlSYUgtlS3/7psLivBy9N
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_b636e73643ebae232f5e13e5ac0fcfd5_bkransomware_floxif.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-21_b636e73643ebae232f5e13e5ac0fcfd5_bkransomware_floxif
-
Size
2.1MB
-
MD5
b636e73643ebae232f5e13e5ac0fcfd5
-
SHA1
02d28009b3dbb0455ba08ce02c6f77bc7206b84a
-
SHA256
89ab86eaec380069331f01ac9f08dbc91da45885e88a6b43d5b607470e0095d2
-
SHA512
64c14bd4bca89b029a32177d6f93b5c333c0c7782b8fa4fcf716ca451239a22f0e5bfeaf4e85387df32aa933252b23368add0280c94b42918b581deff10fe9f6
-
SSDEEP
49152:o2K/LZO2tGJln45YUgtlS3TiiPs46ypqhLivB9k91b:sLZO2tKlSYUgtlS3/7psLivBy9N
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-