General
-
Target
2024-11-18_bd8d56d37a476e48ebfbda1ae894cef9_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
954KB
-
Sample
241118-3fvsdsxcqc
-
MD5
bd8d56d37a476e48ebfbda1ae894cef9
-
SHA1
debdfd982f6eaf7dbff45874621c2fbc3ab00935
-
SHA256
7dddf42be0096f6b711afd43bf49cf139f0c9fa7e58872779dde7d26c399946b
-
SHA512
4c494b617e19e350af74922dac64cef64a8f7018f400b898f69a9a8708fa373734cc2d9496da61d2ea8f93395b3adbacb73248b00bbef4d8f894decc880d8b0a
-
SSDEEP
24576:HMcD+BNDpLiYYdWxyL6Sjtn1VnfNdS3ACSmF1vhD3ojrEH75x:HMX9iY2d9E3ACSmF1v5oux
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-18_bd8d56d37a476e48ebfbda1ae894cef9_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-11-18_bd8d56d37a476e48ebfbda1ae894cef9_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
954KB
-
MD5
bd8d56d37a476e48ebfbda1ae894cef9
-
SHA1
debdfd982f6eaf7dbff45874621c2fbc3ab00935
-
SHA256
7dddf42be0096f6b711afd43bf49cf139f0c9fa7e58872779dde7d26c399946b
-
SHA512
4c494b617e19e350af74922dac64cef64a8f7018f400b898f69a9a8708fa373734cc2d9496da61d2ea8f93395b3adbacb73248b00bbef4d8f894decc880d8b0a
-
SSDEEP
24576:HMcD+BNDpLiYYdWxyL6Sjtn1VnfNdS3ACSmF1vhD3ojrEH75x:HMX9iY2d9E3ACSmF1v5oux
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-