General

  • Target

    2024-11-18_fdb2d37d894afe02799fa838f6199b72_avoslocker_cobalt-strike_floxif_luca-stealer

  • Size

    954KB

  • Sample

    241118-3jwh4axmez

  • MD5

    fdb2d37d894afe02799fa838f6199b72

  • SHA1

    cdaed6d197674f68ef095a8485c08f8ec08370d3

  • SHA256

    8d6961c75ee1eade0a47176e9f44a7ff43408e91a15f5181c3253ef3a58e35ec

  • SHA512

    ec2d80378af266e2965c49a071debd8e3283483ec66c5d9e51a3df6b23b19871e218d512a52100f9d56fba849ccdf3459a28e6680bc1fa8f8ea6d8e52d1f0a99

  • SSDEEP

    24576:HJcD+BNDpLiYYdWxyLVSjtn1VnfNdS3ACSmF1vhD3ojrEH7Gn:HJX9iY209E3ACSmF1v5o/

Malware Config

Targets

    • Target

      2024-11-18_fdb2d37d894afe02799fa838f6199b72_avoslocker_cobalt-strike_floxif_luca-stealer

    • Size

      954KB

    • MD5

      fdb2d37d894afe02799fa838f6199b72

    • SHA1

      cdaed6d197674f68ef095a8485c08f8ec08370d3

    • SHA256

      8d6961c75ee1eade0a47176e9f44a7ff43408e91a15f5181c3253ef3a58e35ec

    • SHA512

      ec2d80378af266e2965c49a071debd8e3283483ec66c5d9e51a3df6b23b19871e218d512a52100f9d56fba849ccdf3459a28e6680bc1fa8f8ea6d8e52d1f0a99

    • SSDEEP

      24576:HJcD+BNDpLiYYdWxyLVSjtn1VnfNdS3ACSmF1vhD3ojrEH7Gn:HJX9iY209E3ACSmF1v5o/

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks