General

  • Target

    2024-11-22_c0054f9b49fe2466586daff417d6c9d6_avoslocker_luca-stealer

  • Size

    1.2MB

  • Sample

    241122-ckad5sskby

  • MD5

    c0054f9b49fe2466586daff417d6c9d6

  • SHA1

    f2ba034713590f6f587ba4fee7420c5bb5ec4b25

  • SHA256

    aaba34a7ee00143fff499b219466498253e9fada28358dae6896870aeba84a99

  • SHA512

    20bd95a4e4a5598e0f18e1442483c746d92c1f06fedd6df6e1adfba4bb08694cb846e6cd3b655589f8540d376678d2c3400a4b56c69fa5b0a8cb00ad67a38735

  • SSDEEP

    24576:e34avxauK03s37QaemGfKvw+RTrsJgjTNHyUt7yQaaPX8Q8p3qkw:E4aHK0837QlmGivw+RToqjTNH5tZaaP/

Score
10/10

Malware Config

Targets

    • Target

      2024-11-22_c0054f9b49fe2466586daff417d6c9d6_avoslocker_luca-stealer

    • Size

      1.2MB

    • MD5

      c0054f9b49fe2466586daff417d6c9d6

    • SHA1

      f2ba034713590f6f587ba4fee7420c5bb5ec4b25

    • SHA256

      aaba34a7ee00143fff499b219466498253e9fada28358dae6896870aeba84a99

    • SHA512

      20bd95a4e4a5598e0f18e1442483c746d92c1f06fedd6df6e1adfba4bb08694cb846e6cd3b655589f8540d376678d2c3400a4b56c69fa5b0a8cb00ad67a38735

    • SSDEEP

      24576:e34avxauK03s37QaemGfKvw+RTrsJgjTNHyUt7yQaaPX8Q8p3qkw:E4aHK0837QlmGivw+RToqjTNH5tZaaP/

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Deletes itself

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks