General
-
Target
2024-11-18_fdb2d37d894afe02799fa838f6199b72_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
954KB
-
Sample
241118-3jwh4axmez
-
MD5
fdb2d37d894afe02799fa838f6199b72
-
SHA1
cdaed6d197674f68ef095a8485c08f8ec08370d3
-
SHA256
8d6961c75ee1eade0a47176e9f44a7ff43408e91a15f5181c3253ef3a58e35ec
-
SHA512
ec2d80378af266e2965c49a071debd8e3283483ec66c5d9e51a3df6b23b19871e218d512a52100f9d56fba849ccdf3459a28e6680bc1fa8f8ea6d8e52d1f0a99
-
SSDEEP
24576:HJcD+BNDpLiYYdWxyLVSjtn1VnfNdS3ACSmF1vhD3ojrEH7Gn:HJX9iY209E3ACSmF1v5o/
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-18_fdb2d37d894afe02799fa838f6199b72_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
2024-11-18_fdb2d37d894afe02799fa838f6199b72_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
954KB
-
MD5
fdb2d37d894afe02799fa838f6199b72
-
SHA1
cdaed6d197674f68ef095a8485c08f8ec08370d3
-
SHA256
8d6961c75ee1eade0a47176e9f44a7ff43408e91a15f5181c3253ef3a58e35ec
-
SHA512
ec2d80378af266e2965c49a071debd8e3283483ec66c5d9e51a3df6b23b19871e218d512a52100f9d56fba849ccdf3459a28e6680bc1fa8f8ea6d8e52d1f0a99
-
SSDEEP
24576:HJcD+BNDpLiYYdWxyLVSjtn1VnfNdS3ACSmF1vhD3ojrEH7Gn:HJX9iY209E3ACSmF1v5o/
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-