General
-
Target
2025-01-01_06afe0441df71ce4d88dd1a605c8b731_bkransomware_floxif_karagany
-
Size
182KB
-
Sample
250101-apgb5szkfq
-
MD5
06afe0441df71ce4d88dd1a605c8b731
-
SHA1
a7971260233d500b5dda8a1e0df2758d02c352be
-
SHA256
7c375305b6b67055820a22f49557a83e5dc6e4119513cacb3d27954f7e335368
-
SHA512
698b7345d976ff6e1475633088cbb23e8ddfe15e8c06d78c46b6b291a7aefd1d4a621c0b55b2d71ca05845e16e0828cca559cf516d46b329cface0905e54edd9
-
SSDEEP
3072:5TP3m3ttWQL6qDUFRaDOKEwV+Am2lQBV+UdE+rECWp7hKETcK9:5TwtWcDUXa7EvbBV+UdvrEFp7hKK
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-01_06afe0441df71ce4d88dd1a605c8b731_bkransomware_floxif_karagany.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-01_06afe0441df71ce4d88dd1a605c8b731_bkransomware_floxif_karagany
-
Size
182KB
-
MD5
06afe0441df71ce4d88dd1a605c8b731
-
SHA1
a7971260233d500b5dda8a1e0df2758d02c352be
-
SHA256
7c375305b6b67055820a22f49557a83e5dc6e4119513cacb3d27954f7e335368
-
SHA512
698b7345d976ff6e1475633088cbb23e8ddfe15e8c06d78c46b6b291a7aefd1d4a621c0b55b2d71ca05845e16e0828cca559cf516d46b329cface0905e54edd9
-
SSDEEP
3072:5TP3m3ttWQL6qDUFRaDOKEwV+Am2lQBV+UdE+rECWp7hKETcK9:5TwtWcDUXa7EvbBV+UdvrEFp7hKK
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-