General
-
Target
2024-12-31_ca5cd6d54ccb12a6292ac1f78c0cb53b_bkransomware_floxif_hijackloader
-
Size
2.4MB
-
Sample
241231-pmeg4asngn
-
MD5
ca5cd6d54ccb12a6292ac1f78c0cb53b
-
SHA1
0dbac05df095248588d2b329c25d62e104a0216d
-
SHA256
dcf541ecfab35be906567f19ed945b65efa857ed2339948ad74fb61f3f4a574d
-
SHA512
d0543048b103f15963e7bdb5dc5aeb44d614deedaf093bb9e502bf48d97b8ee5c16383d5e85342fc561e8600aff2cf1f00db7dff94aca79e093e9e45d3d96705
-
SSDEEP
49152:DSd9/hDMOvWHkl0m+EGynI2uvtOQR4um17NOgpe5i3fNItc+eY:DU9/hIOvWEl0iGyI2uvMRBPe5i3fN+
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-31_ca5cd6d54ccb12a6292ac1f78c0cb53b_bkransomware_floxif_hijackloader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-31_ca5cd6d54ccb12a6292ac1f78c0cb53b_bkransomware_floxif_hijackloader
-
Size
2.4MB
-
MD5
ca5cd6d54ccb12a6292ac1f78c0cb53b
-
SHA1
0dbac05df095248588d2b329c25d62e104a0216d
-
SHA256
dcf541ecfab35be906567f19ed945b65efa857ed2339948ad74fb61f3f4a574d
-
SHA512
d0543048b103f15963e7bdb5dc5aeb44d614deedaf093bb9e502bf48d97b8ee5c16383d5e85342fc561e8600aff2cf1f00db7dff94aca79e093e9e45d3d96705
-
SSDEEP
49152:DSd9/hDMOvWHkl0m+EGynI2uvtOQR4um17NOgpe5i3fNItc+eY:DU9/hIOvWEl0iGyI2uvMRBPe5i3fN+
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-