General

  • Target

    2025-01-10_27b174d459f5e299430420d125375d68_bkransomware_floxif

  • Size

    4.0MB

  • Sample

    250110-jbaf4syrgm

  • MD5

    27b174d459f5e299430420d125375d68

  • SHA1

    5c8ddccb23029f657658970d61b96faee5da765e

  • SHA256

    009ba04ee1d2115a92c304ad86d842db9efd328eda6e867709bbf5d6aca4b7fb

  • SHA512

    58e5d8e2e13ddf60bdc9a081e0ebd17800a8fb43d90323e0b08df805028dfbbee2216dae1f7167bad0bfd880eca89e766bd237df81f8dc401c7555b52bf59b92

  • SSDEEP

    98304:s4LBDHFyGeA+97aCo26vxkp3eMnSyo93S:nVZyGuICaO0yo93S

Malware Config

Targets

    • Target

      2025-01-10_27b174d459f5e299430420d125375d68_bkransomware_floxif

    • Size

      4.0MB

    • MD5

      27b174d459f5e299430420d125375d68

    • SHA1

      5c8ddccb23029f657658970d61b96faee5da765e

    • SHA256

      009ba04ee1d2115a92c304ad86d842db9efd328eda6e867709bbf5d6aca4b7fb

    • SHA512

      58e5d8e2e13ddf60bdc9a081e0ebd17800a8fb43d90323e0b08df805028dfbbee2216dae1f7167bad0bfd880eca89e766bd237df81f8dc401c7555b52bf59b92

    • SSDEEP

      98304:s4LBDHFyGeA+97aCo26vxkp3eMnSyo93S:nVZyGuICaO0yo93S

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks