General

  • Target

    2025-02-05_6fcfb56b16c91d54d02ab56a40263ffc_bkransomware_floxif

  • Size

    4.7MB

  • Sample

    250205-f19eys1qds

  • MD5

    6fcfb56b16c91d54d02ab56a40263ffc

  • SHA1

    8487cbbd3ca0ccbc2b83242196b9a2b5d5cb542c

  • SHA256

    d29541e0da6129c15e1aff8a7de13e5540d0fc115007f7eed0e28839492a1e52

  • SHA512

    32d51fece0cbe7faff52b6046b35f967aa00647b58f314797dba4072be1fb72da1955d925f6eeb2ab5308960994dd4444952bff885c5d82bd00f97384d009ef9

  • SSDEEP

    98304:kBe40bl9dRPenSX5gSYC10DHDB1dE46V3u/u:h3NenG18L/u

Malware Config

Targets

    • Target

      2025-02-05_6fcfb56b16c91d54d02ab56a40263ffc_bkransomware_floxif

    • Size

      4.7MB

    • MD5

      6fcfb56b16c91d54d02ab56a40263ffc

    • SHA1

      8487cbbd3ca0ccbc2b83242196b9a2b5d5cb542c

    • SHA256

      d29541e0da6129c15e1aff8a7de13e5540d0fc115007f7eed0e28839492a1e52

    • SHA512

      32d51fece0cbe7faff52b6046b35f967aa00647b58f314797dba4072be1fb72da1955d925f6eeb2ab5308960994dd4444952bff885c5d82bd00f97384d009ef9

    • SSDEEP

      98304:kBe40bl9dRPenSX5gSYC10DHDB1dE46V3u/u:h3NenG18L/u

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks