General
-
Target
2025-01-31_a22d3955cf7192421039e2cb5609f8e4_bkransomware_floxif_hijackloader
-
Size
3.7MB
-
Sample
250131-w4gr4stldt
-
MD5
a22d3955cf7192421039e2cb5609f8e4
-
SHA1
98b81d93f2c96c8d9cda5b21cac7069229d66023
-
SHA256
0390dbf0e5cc9c6bb15acad1b408114a9753616f07cf982adb8d7193e6dc3ba2
-
SHA512
93aae537fe1d1f397197ea463b528f69a34aff0b5f0b7bffedf89cbc713877378c5c85ae3a584c6b0011cff84c30f85799e9e3e030e0d7fbb982ae1b93f9a286
-
SSDEEP
98304:Z43RC1/uVECAlbtIeod0N1ikH+X5prEbY1Hpk/GL:m3RCdSmLiKbY1HpV
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-31_a22d3955cf7192421039e2cb5609f8e4_bkransomware_floxif_hijackloader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-01-31_a22d3955cf7192421039e2cb5609f8e4_bkransomware_floxif_hijackloader
-
Size
3.7MB
-
MD5
a22d3955cf7192421039e2cb5609f8e4
-
SHA1
98b81d93f2c96c8d9cda5b21cac7069229d66023
-
SHA256
0390dbf0e5cc9c6bb15acad1b408114a9753616f07cf982adb8d7193e6dc3ba2
-
SHA512
93aae537fe1d1f397197ea463b528f69a34aff0b5f0b7bffedf89cbc713877378c5c85ae3a584c6b0011cff84c30f85799e9e3e030e0d7fbb982ae1b93f9a286
-
SSDEEP
98304:Z43RC1/uVECAlbtIeod0N1ikH+X5prEbY1Hpk/GL:m3RCdSmLiKbY1HpV
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-