General
-
Target
2025-01-10_27b174d459f5e299430420d125375d68_bkransomware_floxif
-
Size
4.0MB
-
Sample
250110-h8exeswqht
-
MD5
27b174d459f5e299430420d125375d68
-
SHA1
5c8ddccb23029f657658970d61b96faee5da765e
-
SHA256
009ba04ee1d2115a92c304ad86d842db9efd328eda6e867709bbf5d6aca4b7fb
-
SHA512
58e5d8e2e13ddf60bdc9a081e0ebd17800a8fb43d90323e0b08df805028dfbbee2216dae1f7167bad0bfd880eca89e766bd237df81f8dc401c7555b52bf59b92
-
SSDEEP
98304:s4LBDHFyGeA+97aCo26vxkp3eMnSyo93S:nVZyGuICaO0yo93S
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_27b174d459f5e299430420d125375d68_bkransomware_floxif.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-10_27b174d459f5e299430420d125375d68_bkransomware_floxif
-
Size
4.0MB
-
MD5
27b174d459f5e299430420d125375d68
-
SHA1
5c8ddccb23029f657658970d61b96faee5da765e
-
SHA256
009ba04ee1d2115a92c304ad86d842db9efd328eda6e867709bbf5d6aca4b7fb
-
SHA512
58e5d8e2e13ddf60bdc9a081e0ebd17800a8fb43d90323e0b08df805028dfbbee2216dae1f7167bad0bfd880eca89e766bd237df81f8dc401c7555b52bf59b92
-
SSDEEP
98304:s4LBDHFyGeA+97aCo26vxkp3eMnSyo93S:nVZyGuICaO0yo93S
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1