General
-
Target
2024-12-28_a7a46553bd4c980f57cb08a2aa28eeb7_bkransomware_floxif_karagany
-
Size
1.2MB
-
Sample
241228-a7yn5stjdk
-
MD5
a7a46553bd4c980f57cb08a2aa28eeb7
-
SHA1
a83b0191cea05290c032fe8ea2f6ff901fc93f59
-
SHA256
74076ae7fd684261d2a0aa4f4b0d5c3c4716742e43118ee5c4c4ab6dc1767816
-
SHA512
9f1f841d55672c1b7519b6a4eb682294e0bad2d1a4f265291af8fc4fedbca43085d9fd77ab7f78089417a0d5e0a2eedb2eee057943eab5e73342d2d6ce8a4866
-
SSDEEP
24576:dK4Pq7vwpL09TWyw8Fl6/h15v/tj7marEH7E:dq7+YTWyw8Fl6h3Fj7m+
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-28_a7a46553bd4c980f57cb08a2aa28eeb7_bkransomware_floxif_karagany.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-28_a7a46553bd4c980f57cb08a2aa28eeb7_bkransomware_floxif_karagany.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-28_a7a46553bd4c980f57cb08a2aa28eeb7_bkransomware_floxif_karagany
-
Size
1.2MB
-
MD5
a7a46553bd4c980f57cb08a2aa28eeb7
-
SHA1
a83b0191cea05290c032fe8ea2f6ff901fc93f59
-
SHA256
74076ae7fd684261d2a0aa4f4b0d5c3c4716742e43118ee5c4c4ab6dc1767816
-
SHA512
9f1f841d55672c1b7519b6a4eb682294e0bad2d1a4f265291af8fc4fedbca43085d9fd77ab7f78089417a0d5e0a2eedb2eee057943eab5e73342d2d6ce8a4866
-
SSDEEP
24576:dK4Pq7vwpL09TWyw8Fl6/h15v/tj7marEH7E:dq7+YTWyw8Fl6h3Fj7m+
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-