General

  • Target

    2024-12-31_2707282115cfbd608781d5520bf7d86b_bkransomware_floxif

  • Size

    4.7MB

  • Sample

    241231-jap56stret

  • MD5

    2707282115cfbd608781d5520bf7d86b

  • SHA1

    ad48869dc99046faec30db7f012458d9b54173c5

  • SHA256

    6340a1b436e0d1f6d5a8d2b2933bcf6d7655923e847982c5d34c5abcd5c94311

  • SHA512

    ae7c46b285a4c60a289a63e25218126b53bf00822274059fa1b5bd893f87abf0ea16be249523933c0e2eccbd9cd3817abd3aa42492c8fa58990e70ade8d309e3

  • SSDEEP

    98304:kBe40bl9dRPenSX5gpoCU0DHDB1dE46V3u/vi:h3NenhU8L/K

Malware Config

Targets

    • Target

      2024-12-31_2707282115cfbd608781d5520bf7d86b_bkransomware_floxif

    • Size

      4.7MB

    • MD5

      2707282115cfbd608781d5520bf7d86b

    • SHA1

      ad48869dc99046faec30db7f012458d9b54173c5

    • SHA256

      6340a1b436e0d1f6d5a8d2b2933bcf6d7655923e847982c5d34c5abcd5c94311

    • SHA512

      ae7c46b285a4c60a289a63e25218126b53bf00822274059fa1b5bd893f87abf0ea16be249523933c0e2eccbd9cd3817abd3aa42492c8fa58990e70ade8d309e3

    • SSDEEP

      98304:kBe40bl9dRPenSX5gpoCU0DHDB1dE46V3u/vi:h3NenhU8L/K

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks