General
-
Target
2024-12-23_108c498a512ba2bf104dbb9e865f0277_bkransomware_floxif
-
Size
2.1MB
-
Sample
241223-py86vazldy
-
MD5
108c498a512ba2bf104dbb9e865f0277
-
SHA1
b731c545d251c6823cf268c5ac2feb9f2b43075d
-
SHA256
a629520564da3f32e55207b4b987f0e049d52434f7684a43e745ea19900e4189
-
SHA512
825c2b071bc98b2fe07524fdea6d31c7670c2c1e7ba02aec64e4093cfd17e41b4ff76018e31788de4818bc7cce6b40bbebd5e0abe688a7800f20ec178d16fbe5
-
SSDEEP
49152:/ofqq2msxBMWSxRio/D4avGJ6+Y59N2153dqPk4utu+NNAVw6rPY1:gCq2R3MWSxN/M2GJrYx2r3UPk4utCVo
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-23_108c498a512ba2bf104dbb9e865f0277_bkransomware_floxif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-23_108c498a512ba2bf104dbb9e865f0277_bkransomware_floxif.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-23_108c498a512ba2bf104dbb9e865f0277_bkransomware_floxif
-
Size
2.1MB
-
MD5
108c498a512ba2bf104dbb9e865f0277
-
SHA1
b731c545d251c6823cf268c5ac2feb9f2b43075d
-
SHA256
a629520564da3f32e55207b4b987f0e049d52434f7684a43e745ea19900e4189
-
SHA512
825c2b071bc98b2fe07524fdea6d31c7670c2c1e7ba02aec64e4093cfd17e41b4ff76018e31788de4818bc7cce6b40bbebd5e0abe688a7800f20ec178d16fbe5
-
SSDEEP
49152:/ofqq2msxBMWSxRio/D4avGJ6+Y59N2153dqPk4utu+NNAVw6rPY1:gCq2R3MWSxN/M2GJrYx2r3UPk4utCVo
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-