General
-
Target
2025-02-02_089ba18e92ea40793fa952c00c8c6223_bkransomware_floxif_hijackloader
-
Size
6.8MB
-
Sample
250202-x57wcsxngr
-
MD5
089ba18e92ea40793fa952c00c8c6223
-
SHA1
354248b307863503a550eef99bb5a1166bd616b0
-
SHA256
e7947f62c01f0fa2ef92bebe73a1ddc163eef89ec7ad231d7e13daf50914afa9
-
SHA512
2f08f52f96a65864f340f307bf427fe676e5954017340c1fcfc62c6ea4d631bc49016a29921a52d6ad6d01ae78d66591954c4376ef71cb4935a263ec34fdc207
-
SSDEEP
98304:9kuJz1xn3h6i02uaYmGSGT17L6z6GO9Pcgv5nWfBY8C8fhlH2vef9Ivsb:9Jl3h6i02uaYnSGTF6c9PcuqYmf2Gb
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-02_089ba18e92ea40793fa952c00c8c6223_bkransomware_floxif_hijackloader.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-02-02_089ba18e92ea40793fa952c00c8c6223_bkransomware_floxif_hijackloader.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
2025-02-02_089ba18e92ea40793fa952c00c8c6223_bkransomware_floxif_hijackloader
-
Size
6.8MB
-
MD5
089ba18e92ea40793fa952c00c8c6223
-
SHA1
354248b307863503a550eef99bb5a1166bd616b0
-
SHA256
e7947f62c01f0fa2ef92bebe73a1ddc163eef89ec7ad231d7e13daf50914afa9
-
SHA512
2f08f52f96a65864f340f307bf427fe676e5954017340c1fcfc62c6ea4d631bc49016a29921a52d6ad6d01ae78d66591954c4376ef71cb4935a263ec34fdc207
-
SSDEEP
98304:9kuJz1xn3h6i02uaYmGSGT17L6z6GO9Pcgv5nWfBY8C8fhlH2vef9Ivsb:9Jl3h6i02uaYnSGTF6c9PcuqYmf2Gb
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-