General

  • Target

    2025-02-02_089ba18e92ea40793fa952c00c8c6223_bkransomware_floxif_hijackloader

  • Size

    6.8MB

  • Sample

    250202-x57wcsxngr

  • MD5

    089ba18e92ea40793fa952c00c8c6223

  • SHA1

    354248b307863503a550eef99bb5a1166bd616b0

  • SHA256

    e7947f62c01f0fa2ef92bebe73a1ddc163eef89ec7ad231d7e13daf50914afa9

  • SHA512

    2f08f52f96a65864f340f307bf427fe676e5954017340c1fcfc62c6ea4d631bc49016a29921a52d6ad6d01ae78d66591954c4376ef71cb4935a263ec34fdc207

  • SSDEEP

    98304:9kuJz1xn3h6i02uaYmGSGT17L6z6GO9Pcgv5nWfBY8C8fhlH2vef9Ivsb:9Jl3h6i02uaYnSGTF6c9PcuqYmf2Gb

Malware Config

Targets

    • Target

      2025-02-02_089ba18e92ea40793fa952c00c8c6223_bkransomware_floxif_hijackloader

    • Size

      6.8MB

    • MD5

      089ba18e92ea40793fa952c00c8c6223

    • SHA1

      354248b307863503a550eef99bb5a1166bd616b0

    • SHA256

      e7947f62c01f0fa2ef92bebe73a1ddc163eef89ec7ad231d7e13daf50914afa9

    • SHA512

      2f08f52f96a65864f340f307bf427fe676e5954017340c1fcfc62c6ea4d631bc49016a29921a52d6ad6d01ae78d66591954c4376ef71cb4935a263ec34fdc207

    • SSDEEP

      98304:9kuJz1xn3h6i02uaYmGSGT17L6z6GO9Pcgv5nWfBY8C8fhlH2vef9Ivsb:9Jl3h6i02uaYnSGTF6c9PcuqYmf2Gb

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks