General

  • Target

    2025-02-01_e2b249fc920ebb423f00a70cdb76b9c2_bkransomware_floxif_hijackloader

  • Size

    3.7MB

  • Sample

    250201-ka2dwavndx

  • MD5

    e2b249fc920ebb423f00a70cdb76b9c2

  • SHA1

    d7118450675f2424ead15ae168100d19b04e4688

  • SHA256

    7bffd081b7c04dedf9e9603e262b8241f542b11368b70178f2f306c8bbca06c1

  • SHA512

    81ce1613cca0e8d7d3a812bcf4fad71cfeb59cb41bb2cfad04564b4cdfe2c1921e2df16bce71b0491a54befdd65f87658f303b3bc71a86e8a04e93bf2b0e4553

  • SSDEEP

    98304:F43RC1/uVECAlbtIeod0i1ikH5X5prEbY1Hpk/G2:y3RCdSmq7KbY1Hp0

Malware Config

Targets

    • Target

      2025-02-01_e2b249fc920ebb423f00a70cdb76b9c2_bkransomware_floxif_hijackloader

    • Size

      3.7MB

    • MD5

      e2b249fc920ebb423f00a70cdb76b9c2

    • SHA1

      d7118450675f2424ead15ae168100d19b04e4688

    • SHA256

      7bffd081b7c04dedf9e9603e262b8241f542b11368b70178f2f306c8bbca06c1

    • SHA512

      81ce1613cca0e8d7d3a812bcf4fad71cfeb59cb41bb2cfad04564b4cdfe2c1921e2df16bce71b0491a54befdd65f87658f303b3bc71a86e8a04e93bf2b0e4553

    • SSDEEP

      98304:F43RC1/uVECAlbtIeod0i1ikH5X5prEbY1Hpk/G2:y3RCdSmq7KbY1Hp0

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks