General
-
Target
2025-01-31_aced96f38948fc4c236e789fbb0045f4_bkransomware_floxif
-
Size
4.7MB
-
Sample
250131-nnfk4strg1
-
MD5
aced96f38948fc4c236e789fbb0045f4
-
SHA1
1b98777502055cf7b4dd6f96409640af4049b4cb
-
SHA256
885fc5280f538a0ee8ad753071251c8118064955de766720090f42d44c0df63e
-
SHA512
91896aff17c19db8ae2bfef1f117851dc595b5be45b7b5a63d2e9538b3ea9831acda08efc4ac5a0f581a7baf9388ccc9a1f6e0dc6b500185f050d28c142cde33
-
SSDEEP
98304:kBe40bl9dSPenSX5gSoCb0DHDB1dE46V3u/1:h3Qenqb8L/1
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-31_aced96f38948fc4c236e789fbb0045f4_bkransomware_floxif.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-31_aced96f38948fc4c236e789fbb0045f4_bkransomware_floxif.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
2025-01-31_aced96f38948fc4c236e789fbb0045f4_bkransomware_floxif
-
Size
4.7MB
-
MD5
aced96f38948fc4c236e789fbb0045f4
-
SHA1
1b98777502055cf7b4dd6f96409640af4049b4cb
-
SHA256
885fc5280f538a0ee8ad753071251c8118064955de766720090f42d44c0df63e
-
SHA512
91896aff17c19db8ae2bfef1f117851dc595b5be45b7b5a63d2e9538b3ea9831acda08efc4ac5a0f581a7baf9388ccc9a1f6e0dc6b500185f050d28c142cde33
-
SSDEEP
98304:kBe40bl9dSPenSX5gSoCb0DHDB1dE46V3u/1:h3Qenqb8L/1
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-