General
-
Target
2025-04-23_69f619d7e025fcf3848f0d76972d3d7d_bkransomware_darkgate_elex_floxif_karagany_rhadamanthys
-
Size
182KB
-
Sample
250423-3xq6jatvds
-
MD5
69f619d7e025fcf3848f0d76972d3d7d
-
SHA1
bbd5966558cb8b4b379fb1ca0ce3c7ba366b032a
-
SHA256
3ee3d4ca9ce53e5606a1683a8d090ff9835f745fc03d7dadbfe5575e9c0e6428
-
SHA512
076238e6670938931dea55b7dbd02b9d48855ebfdbe2c5e1871cba75d1502986602613482083b5a345b549558c49534e7432ae7d0dead5a1a62143c6ccb88d14
-
SSDEEP
3072:5TP3m3tnEWQL6qqYhFRaDOKEwV+Am2lQBV+UdE+rECWp7hKYnf5s:5TwnEWcdXa7EvbBV+UdvrEFp7hKYhs
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-23_69f619d7e025fcf3848f0d76972d3d7d_bkransomware_darkgate_elex_floxif_karagany_rhadamanthys.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
2025-04-23_69f619d7e025fcf3848f0d76972d3d7d_bkransomware_darkgate_elex_floxif_karagany_rhadamanthys
-
Size
182KB
-
MD5
69f619d7e025fcf3848f0d76972d3d7d
-
SHA1
bbd5966558cb8b4b379fb1ca0ce3c7ba366b032a
-
SHA256
3ee3d4ca9ce53e5606a1683a8d090ff9835f745fc03d7dadbfe5575e9c0e6428
-
SHA512
076238e6670938931dea55b7dbd02b9d48855ebfdbe2c5e1871cba75d1502986602613482083b5a345b549558c49534e7432ae7d0dead5a1a62143c6ccb88d14
-
SSDEEP
3072:5TP3m3tnEWQL6qqYhFRaDOKEwV+Am2lQBV+UdE+rECWp7hKYnf5s:5TwnEWcdXa7EvbBV+UdvrEFp7hKYhs
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-