General
-
Target
2024-06-13_dbde29d0b5ac09f3c91a93c6da46d2b0_avoslocker_cobalt-strike_floxif
-
Size
662KB
-
Sample
240613-19rxgswfkp
-
MD5
dbde29d0b5ac09f3c91a93c6da46d2b0
-
SHA1
c5560dfb7a9cc3f299f8784ad08fd485c8f01cc0
-
SHA256
367f46e316769c2c512ba9aaa8f09050d3621dbbdd805e8fad06ebd1e16cefa6
-
SHA512
f365087a51e905a43cc00c9e3a386d925619f195f25b6a3f9d41126cbbcdfe700a2b940b8ff9557f8ee5d31a045ab04793632be9b819721e22330f3d21ab74cf
-
SSDEEP
12288:V56LEuV6DehBalojQRHnVWqqPIBONhxsUzrlSBjvrEH7W:f6guVXgm/xsUzrlUrEH7W
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-13_dbde29d0b5ac09f3c91a93c6da46d2b0_avoslocker_cobalt-strike_floxif.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-13_dbde29d0b5ac09f3c91a93c6da46d2b0_avoslocker_cobalt-strike_floxif.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
2024-06-13_dbde29d0b5ac09f3c91a93c6da46d2b0_avoslocker_cobalt-strike_floxif
-
Size
662KB
-
MD5
dbde29d0b5ac09f3c91a93c6da46d2b0
-
SHA1
c5560dfb7a9cc3f299f8784ad08fd485c8f01cc0
-
SHA256
367f46e316769c2c512ba9aaa8f09050d3621dbbdd805e8fad06ebd1e16cefa6
-
SHA512
f365087a51e905a43cc00c9e3a386d925619f195f25b6a3f9d41126cbbcdfe700a2b940b8ff9557f8ee5d31a045ab04793632be9b819721e22330f3d21ab74cf
-
SSDEEP
12288:V56LEuV6DehBalojQRHnVWqqPIBONhxsUzrlSBjvrEH7W:f6guVXgm/xsUzrlUrEH7W
Score9/10-
UPX dump on OEP (original entry point)
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-