General
-
Target
2025-02-07_c4fe8232dd4d2892c36e61dc670f7f6b_bkransomware_floxif
-
Size
2.8MB
-
Sample
250207-hynftatja1
-
MD5
c4fe8232dd4d2892c36e61dc670f7f6b
-
SHA1
486f1730ccd9dc74ab5075ebe419f4ba82a6d4ff
-
SHA256
3517969d20bf8c6158789b1639bbd609485d561fd65bf1b4e61fe70b9eeb3f87
-
SHA512
48e03e0b52baa6ae52d80f8792a2bbaf07f7a86ba952af67a8a7157183accf1732ab5cd08ef1aa397009dccc591e4ab30766bdb3bbc113f642f48d1c67b6083f
-
SSDEEP
49152:Q62LbFE2IgmACVcRF93LkEt4afabs5cSBvApu7uxAaWq+/hip9FNq2ViaCjuymgX:Q6CbAgmAC+RDLkI4afabsTmKux+sU2VC
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-07_c4fe8232dd4d2892c36e61dc670f7f6b_bkransomware_floxif.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2025-02-07_c4fe8232dd4d2892c36e61dc670f7f6b_bkransomware_floxif
-
Size
2.8MB
-
MD5
c4fe8232dd4d2892c36e61dc670f7f6b
-
SHA1
486f1730ccd9dc74ab5075ebe419f4ba82a6d4ff
-
SHA256
3517969d20bf8c6158789b1639bbd609485d561fd65bf1b4e61fe70b9eeb3f87
-
SHA512
48e03e0b52baa6ae52d80f8792a2bbaf07f7a86ba952af67a8a7157183accf1732ab5cd08ef1aa397009dccc591e4ab30766bdb3bbc113f642f48d1c67b6083f
-
SSDEEP
49152:Q62LbFE2IgmACVcRF93LkEt4afabs5cSBvApu7uxAaWq+/hip9FNq2ViaCjuymgX:Q6CbAgmAC+RDLkI4afabsTmKux+sU2VC
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-