General
-
Target
2024-09-10_94846960886bd80460316cf023cf6909_avoslocker_floxif_revil
-
Size
2.2MB
-
Sample
240910-bs9crssala
-
MD5
94846960886bd80460316cf023cf6909
-
SHA1
7ed8c1caf2d8b7d3899af95a950d49ab81c7939a
-
SHA256
91a4d6d8d86c2d05b8ea40037a908401724e03aff6ba762eed413757652d3cbe
-
SHA512
f9678c34e04348b4b289b5cc08295668961ffbbcb8194a79bd591314f492d9a03eea0d746e4f11d413a74bf772d2bb2cc281f893fce31af416b649466c5a902d
-
SSDEEP
49152:Jxp462cSrHt/BqUqMdFHMRU7tPAqRmruhGMrI6pf4:Jxp4hcSrHtp5jCqRmB
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-10_94846960886bd80460316cf023cf6909_avoslocker_floxif_revil.exe
Resource
win7-20240704-en
Malware Config
Targets
-
-
Target
2024-09-10_94846960886bd80460316cf023cf6909_avoslocker_floxif_revil
-
Size
2.2MB
-
MD5
94846960886bd80460316cf023cf6909
-
SHA1
7ed8c1caf2d8b7d3899af95a950d49ab81c7939a
-
SHA256
91a4d6d8d86c2d05b8ea40037a908401724e03aff6ba762eed413757652d3cbe
-
SHA512
f9678c34e04348b4b289b5cc08295668961ffbbcb8194a79bd591314f492d9a03eea0d746e4f11d413a74bf772d2bb2cc281f893fce31af416b649466c5a902d
-
SSDEEP
49152:Jxp462cSrHt/BqUqMdFHMRU7tPAqRmruhGMrI6pf4:Jxp4hcSrHtp5jCqRmB
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-