General

  • Target

    2025-02-07_376cfa73463e67d24b640f264f6e3c39_bkransomware_floxif

  • Size

    776KB

  • Sample

    250207-2ecprasmfj

  • MD5

    376cfa73463e67d24b640f264f6e3c39

  • SHA1

    84036632b492bd8ee2f2dad097f682e43f569bc2

  • SHA256

    3f2e22e05d7960109272774645cb9b39a2c49685f2f5d639caa53390f6bd444d

  • SHA512

    39aba4dfeb43b7bb3457caea8a3c18fffba77a4ea2995ade1da364b42f64b3a2b8a3872f35da71abf089138c10949ed1cb2f7ea9c48a2d3a0fe87dbb5aa4f8f5

  • SSDEEP

    12288:oPNLwHoy1CFMlutqDQF8oRrsau54823Kc1u2BjvrEH75:kLwIy1CFOPY8o9yXgKcNrEH75

Malware Config

Targets

    • Target

      2025-02-07_376cfa73463e67d24b640f264f6e3c39_bkransomware_floxif

    • Size

      776KB

    • MD5

      376cfa73463e67d24b640f264f6e3c39

    • SHA1

      84036632b492bd8ee2f2dad097f682e43f569bc2

    • SHA256

      3f2e22e05d7960109272774645cb9b39a2c49685f2f5d639caa53390f6bd444d

    • SHA512

      39aba4dfeb43b7bb3457caea8a3c18fffba77a4ea2995ade1da364b42f64b3a2b8a3872f35da71abf089138c10949ed1cb2f7ea9c48a2d3a0fe87dbb5aa4f8f5

    • SSDEEP

      12288:oPNLwHoy1CFMlutqDQF8oRrsau54823Kc1u2BjvrEH75:kLwIy1CFOPY8o9yXgKcNrEH75

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Downloads MZ/PE file

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks