General
-
Target
2024-12-29_0d3283110219080fb7e4481d2b874679_bkransomware_floxif
-
Size
4.7MB
-
Sample
241229-nhjqkszqgv
-
MD5
0d3283110219080fb7e4481d2b874679
-
SHA1
6cf97fb846ff0ee2bff523fdf12d46ddf0b4d728
-
SHA256
861df3a8477b6c139713f1b9001f3a28313aa253bb64fd0ec662415375999818
-
SHA512
5b39e48b7fe9e82efb8303f9496efb74c250aee3d8dcbbc424d8dea46d51a3e12f17fe7bc0124f6d51298c3a992875ee3df4d992ecc8d1ae16620b7200639561
-
SSDEEP
98304:kBe403l9dRPenSX5gSoC60DHDB1dE46V3u/VD:hHNenq68L/p
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-29_0d3283110219080fb7e4481d2b874679_bkransomware_floxif.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
2024-12-29_0d3283110219080fb7e4481d2b874679_bkransomware_floxif
-
Size
4.7MB
-
MD5
0d3283110219080fb7e4481d2b874679
-
SHA1
6cf97fb846ff0ee2bff523fdf12d46ddf0b4d728
-
SHA256
861df3a8477b6c139713f1b9001f3a28313aa253bb64fd0ec662415375999818
-
SHA512
5b39e48b7fe9e82efb8303f9496efb74c250aee3d8dcbbc424d8dea46d51a3e12f17fe7bc0124f6d51298c3a992875ee3df4d992ecc8d1ae16620b7200639561
-
SSDEEP
98304:kBe403l9dRPenSX5gSoC60DHDB1dE46V3u/VD:hHNenq68L/p
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-