General
-
Target
2025-02-07_376cfa73463e67d24b640f264f6e3c39_bkransomware_floxif
-
Size
776KB
-
Sample
250207-2ecprasmfj
-
MD5
376cfa73463e67d24b640f264f6e3c39
-
SHA1
84036632b492bd8ee2f2dad097f682e43f569bc2
-
SHA256
3f2e22e05d7960109272774645cb9b39a2c49685f2f5d639caa53390f6bd444d
-
SHA512
39aba4dfeb43b7bb3457caea8a3c18fffba77a4ea2995ade1da364b42f64b3a2b8a3872f35da71abf089138c10949ed1cb2f7ea9c48a2d3a0fe87dbb5aa4f8f5
-
SSDEEP
12288:oPNLwHoy1CFMlutqDQF8oRrsau54823Kc1u2BjvrEH75:kLwIy1CFOPY8o9yXgKcNrEH75
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-07_376cfa73463e67d24b640f264f6e3c39_bkransomware_floxif.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2025-02-07_376cfa73463e67d24b640f264f6e3c39_bkransomware_floxif.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
2025-02-07_376cfa73463e67d24b640f264f6e3c39_bkransomware_floxif
-
Size
776KB
-
MD5
376cfa73463e67d24b640f264f6e3c39
-
SHA1
84036632b492bd8ee2f2dad097f682e43f569bc2
-
SHA256
3f2e22e05d7960109272774645cb9b39a2c49685f2f5d639caa53390f6bd444d
-
SHA512
39aba4dfeb43b7bb3457caea8a3c18fffba77a4ea2995ade1da364b42f64b3a2b8a3872f35da71abf089138c10949ed1cb2f7ea9c48a2d3a0fe87dbb5aa4f8f5
-
SSDEEP
12288:oPNLwHoy1CFMlutqDQF8oRrsau54823Kc1u2BjvrEH75:kLwIy1CFOPY8o9yXgKcNrEH75
-
Floxif family
-
Detects Floxif payload
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-