General
-
Target
2024-09-19_6e7c829a942f2521cad534f80132fbd2_avoslocker_cobalt-strike_floxif
-
Size
224KB
-
Sample
240919-azx3mssakr
-
MD5
6e7c829a942f2521cad534f80132fbd2
-
SHA1
0874fe214874d7ca2e45818be75f6f66df14dab1
-
SHA256
c7f8afb644210733d41c69e791b76c0e0dd40b509d166d6242a4919b55454999
-
SHA512
013ddb7406adbb8ff3476d634a37cde6526d4966eb332eff02e18ff9333bf270ddf5d53e3a03d0509a3f54a6e978cad289d28e7fc9fbc2fd9c7f20531f5ee7f2
-
SSDEEP
6144:ay52zi7ajBvLKZH2FaLw9hH4JdBV+UdvrEFp7hKDpo:ay52zi+jB59hH4JdBjvrEH7Qo
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-19_6e7c829a942f2521cad534f80132fbd2_avoslocker_cobalt-strike_floxif.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-09-19_6e7c829a942f2521cad534f80132fbd2_avoslocker_cobalt-strike_floxif
-
Size
224KB
-
MD5
6e7c829a942f2521cad534f80132fbd2
-
SHA1
0874fe214874d7ca2e45818be75f6f66df14dab1
-
SHA256
c7f8afb644210733d41c69e791b76c0e0dd40b509d166d6242a4919b55454999
-
SHA512
013ddb7406adbb8ff3476d634a37cde6526d4966eb332eff02e18ff9333bf270ddf5d53e3a03d0509a3f54a6e978cad289d28e7fc9fbc2fd9c7f20531f5ee7f2
-
SSDEEP
6144:ay52zi7ajBvLKZH2FaLw9hH4JdBV+UdvrEFp7hKDpo:ay52zi+jB59hH4JdBjvrEH7Qo
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-