General
-
Target
2025-02-01_e2b249fc920ebb423f00a70cdb76b9c2_bkransomware_floxif_hijackloader
-
Size
3.7MB
-
Sample
250201-ka2dwavndx
-
MD5
e2b249fc920ebb423f00a70cdb76b9c2
-
SHA1
d7118450675f2424ead15ae168100d19b04e4688
-
SHA256
7bffd081b7c04dedf9e9603e262b8241f542b11368b70178f2f306c8bbca06c1
-
SHA512
81ce1613cca0e8d7d3a812bcf4fad71cfeb59cb41bb2cfad04564b4cdfe2c1921e2df16bce71b0491a54befdd65f87658f303b3bc71a86e8a04e93bf2b0e4553
-
SSDEEP
98304:F43RC1/uVECAlbtIeod0i1ikH5X5prEbY1Hpk/G2:y3RCdSmq7KbY1Hp0
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-01_e2b249fc920ebb423f00a70cdb76b9c2_bkransomware_floxif_hijackloader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-01_e2b249fc920ebb423f00a70cdb76b9c2_bkransomware_floxif_hijackloader
-
Size
3.7MB
-
MD5
e2b249fc920ebb423f00a70cdb76b9c2
-
SHA1
d7118450675f2424ead15ae168100d19b04e4688
-
SHA256
7bffd081b7c04dedf9e9603e262b8241f542b11368b70178f2f306c8bbca06c1
-
SHA512
81ce1613cca0e8d7d3a812bcf4fad71cfeb59cb41bb2cfad04564b4cdfe2c1921e2df16bce71b0491a54befdd65f87658f303b3bc71a86e8a04e93bf2b0e4553
-
SSDEEP
98304:F43RC1/uVECAlbtIeod0i1ikH5X5prEbY1Hpk/G2:y3RCdSmq7KbY1Hp0
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-