General
-
Target
2025-01-10_8d7d56e290266a313874b9f9efca4573_bkransomware_floxif
-
Size
26.9MB
-
Sample
250110-kvbc7a1ran
-
MD5
8d7d56e290266a313874b9f9efca4573
-
SHA1
4bf0343454ed6b091cd125a1054eed8e542eab79
-
SHA256
68f37e5e4fa62f7b37e2c0d3397a8eaf010b1bf99dc955166c067cf0efebd7a5
-
SHA512
e43956e5fcb4c4b317dbe4b260f8691682358c0b5c3dd2903549e19dd54f3413b7bcb3e44a9b6d92425d769f78f8d496c7a425914a5275aba4a93a6c1df34838
-
SSDEEP
786432:JR+SCntaUfOGhTwRoZJOH+vm2vgYCiY5SIiRf:JR+LnNOG5Jn6YCi79f
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-10_8d7d56e290266a313874b9f9efca4573_bkransomware_floxif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-10_8d7d56e290266a313874b9f9efca4573_bkransomware_floxif.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2025-01-10_8d7d56e290266a313874b9f9efca4573_bkransomware_floxif
-
Size
26.9MB
-
MD5
8d7d56e290266a313874b9f9efca4573
-
SHA1
4bf0343454ed6b091cd125a1054eed8e542eab79
-
SHA256
68f37e5e4fa62f7b37e2c0d3397a8eaf010b1bf99dc955166c067cf0efebd7a5
-
SHA512
e43956e5fcb4c4b317dbe4b260f8691682358c0b5c3dd2903549e19dd54f3413b7bcb3e44a9b6d92425d769f78f8d496c7a425914a5275aba4a93a6c1df34838
-
SSDEEP
786432:JR+SCntaUfOGhTwRoZJOH+vm2vgYCiY5SIiRf:JR+LnNOG5Jn6YCi79f
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-