General

  • Target

    2024-11-18_37532b9cbfb8ecd4074e2ae37f5c8515_avoslocker_cobalt-strike_floxif_luca-stealer

  • Size

    224KB

  • Sample

    241118-xhz71atbkq

  • MD5

    37532b9cbfb8ecd4074e2ae37f5c8515

  • SHA1

    b9e93f575b15348ea249f252b31c75260d9013b6

  • SHA256

    936b15d5344c5e942acaff347162bac65bbb08c8a44ec0f62372b09232600b43

  • SHA512

    1c59d6f9d9482104184174684099be15730fd2cb798627e5687c8a3d7b8004658012a8b727cb997fbfa2605f5bde233ab46a9e6b7be34f605422a92f70c7ff2f

  • SSDEEP

    6144:ayS2zi7ajVQcGLKZH2FaLw9hH4JdBV+UdvrEFp7hKCou:ayS2zi+jVw9hH4JdBjvrEH7mu

Malware Config

Targets

    • Target

      2024-11-18_37532b9cbfb8ecd4074e2ae37f5c8515_avoslocker_cobalt-strike_floxif_luca-stealer

    • Size

      224KB

    • MD5

      37532b9cbfb8ecd4074e2ae37f5c8515

    • SHA1

      b9e93f575b15348ea249f252b31c75260d9013b6

    • SHA256

      936b15d5344c5e942acaff347162bac65bbb08c8a44ec0f62372b09232600b43

    • SHA512

      1c59d6f9d9482104184174684099be15730fd2cb798627e5687c8a3d7b8004658012a8b727cb997fbfa2605f5bde233ab46a9e6b7be34f605422a92f70c7ff2f

    • SSDEEP

      6144:ayS2zi7ajVQcGLKZH2FaLw9hH4JdBV+UdvrEFp7hKCou:ayS2zi+jVw9hH4JdBjvrEH7mu

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks