General
-
Target
2025-02-07_35699e47451db1d4750fed87bb48df11_bkransomware_floxif
-
Size
3.1MB
-
Sample
250207-2d6lfasmek
-
MD5
35699e47451db1d4750fed87bb48df11
-
SHA1
d6849db6d98b5424f880c4dab16a90d9a6460777
-
SHA256
51a34541203abe060aaefeafa6b8b369dbce915ee883a99a24892f849190e448
-
SHA512
ba957fbbc139d16791f3db5edb77e498bae5229345c9634ea6be547439fe1b358c564f7f41a961160d7ea0e829eb41d28cca44aa84952d05ce8246ceb251d72d
-
SSDEEP
98304:LyuAczGg/bu9VnlWAJQ9/D+WbKpvhm4WUZPWu/:LjGN97XWbKpvhm4WUZPWu/
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-07_35699e47451db1d4750fed87bb48df11_bkransomware_floxif.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-07_35699e47451db1d4750fed87bb48df11_bkransomware_floxif.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
2025-02-07_35699e47451db1d4750fed87bb48df11_bkransomware_floxif
-
Size
3.1MB
-
MD5
35699e47451db1d4750fed87bb48df11
-
SHA1
d6849db6d98b5424f880c4dab16a90d9a6460777
-
SHA256
51a34541203abe060aaefeafa6b8b369dbce915ee883a99a24892f849190e448
-
SHA512
ba957fbbc139d16791f3db5edb77e498bae5229345c9634ea6be547439fe1b358c564f7f41a961160d7ea0e829eb41d28cca44aa84952d05ce8246ceb251d72d
-
SSDEEP
98304:LyuAczGg/bu9VnlWAJQ9/D+WbKpvhm4WUZPWu/:LjGN97XWbKpvhm4WUZPWu/
-
Floxif family
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-