General
-
Target
2024-11-20_c7f2b256dc8c31ed42f40ef0b1e5fd07_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
464KB
-
Sample
241120-lhqg1svhnj
-
MD5
c7f2b256dc8c31ed42f40ef0b1e5fd07
-
SHA1
148fde3d4a10f9eb4e67689e1ece34ba0ebbca09
-
SHA256
704b524d9354740acf30f656749d13a51e0bc06a06d8056e4c028d4fa130e442
-
SHA512
59341083b3e2cce2472de86b677fd75bd56c697829678c388737aa79c2eef50eb3e1035f3c9f47ab63f38024a295584d57886ffb964e9f9a216b593c00e4f375
-
SSDEEP
12288:BbcMWzL0H2QlEmnVWqqPIBONhxs7pPo8OBjvrEH7e:BbcMWKkN/xs7BxorEH7e
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_c7f2b256dc8c31ed42f40ef0b1e5fd07_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-11-20_c7f2b256dc8c31ed42f40ef0b1e5fd07_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
464KB
-
MD5
c7f2b256dc8c31ed42f40ef0b1e5fd07
-
SHA1
148fde3d4a10f9eb4e67689e1ece34ba0ebbca09
-
SHA256
704b524d9354740acf30f656749d13a51e0bc06a06d8056e4c028d4fa130e442
-
SHA512
59341083b3e2cce2472de86b677fd75bd56c697829678c388737aa79c2eef50eb3e1035f3c9f47ab63f38024a295584d57886ffb964e9f9a216b593c00e4f375
-
SSDEEP
12288:BbcMWzL0H2QlEmnVWqqPIBONhxs7pPo8OBjvrEH7e:BbcMWKkN/xs7BxorEH7e
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-