General
-
Target
2024-05-25_68371107f3edfe12945d03f178c2c0bc_avoslocker_floxif
-
Size
38.9MB
-
Sample
240525-a1y2bsgg94
-
MD5
68371107f3edfe12945d03f178c2c0bc
-
SHA1
09787b9f662e676cd1fc9642b672ce3a5201c073
-
SHA256
0e5a5cc89351c7808b82d49177372dd95c74b6fbefedf7a8ed0c3388b17ce5b8
-
SHA512
b3887b44cffc0a26c24416342f26a1b399b64d8fc589bf69aa2e4bcc77135a147d158911723ffba396463260e1394d0b1e5a603c8cfa799ed8f676eef824158c
-
SSDEEP
786432:Mdlg/NePYWEc2SPtG4hHsDoitnVUrkQy2FoUNJsZG4KHBSiW87:MLgFwEc2gG6MDYVyrcJl3HpV
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_68371107f3edfe12945d03f178c2c0bc_avoslocker_floxif.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-25_68371107f3edfe12945d03f178c2c0bc_avoslocker_floxif.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
2024-05-25_68371107f3edfe12945d03f178c2c0bc_avoslocker_floxif
-
Size
38.9MB
-
MD5
68371107f3edfe12945d03f178c2c0bc
-
SHA1
09787b9f662e676cd1fc9642b672ce3a5201c073
-
SHA256
0e5a5cc89351c7808b82d49177372dd95c74b6fbefedf7a8ed0c3388b17ce5b8
-
SHA512
b3887b44cffc0a26c24416342f26a1b399b64d8fc589bf69aa2e4bcc77135a147d158911723ffba396463260e1394d0b1e5a603c8cfa799ed8f676eef824158c
-
SSDEEP
786432:Mdlg/NePYWEc2SPtG4hHsDoitnVUrkQy2FoUNJsZG4KHBSiW87:MLgFwEc2gG6MDYVyrcJl3HpV
Score9/10-
UPX dump on OEP (original entry point)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-