General
-
Target
2024-11-22_c0054f9b49fe2466586daff417d6c9d6_avoslocker_luca-stealer
-
Size
1.2MB
-
Sample
241122-ckad5sskby
-
MD5
c0054f9b49fe2466586daff417d6c9d6
-
SHA1
f2ba034713590f6f587ba4fee7420c5bb5ec4b25
-
SHA256
aaba34a7ee00143fff499b219466498253e9fada28358dae6896870aeba84a99
-
SHA512
20bd95a4e4a5598e0f18e1442483c746d92c1f06fedd6df6e1adfba4bb08694cb846e6cd3b655589f8540d376678d2c3400a4b56c69fa5b0a8cb00ad67a38735
-
SSDEEP
24576:e34avxauK03s37QaemGfKvw+RTrsJgjTNHyUt7yQaaPX8Q8p3qkw:E4aHK0837QlmGivw+RToqjTNH5tZaaP/
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_c0054f9b49fe2466586daff417d6c9d6_avoslocker_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-22_c0054f9b49fe2466586daff417d6c9d6_avoslocker_luca-stealer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-11-22_c0054f9b49fe2466586daff417d6c9d6_avoslocker_luca-stealer
-
Size
1.2MB
-
MD5
c0054f9b49fe2466586daff417d6c9d6
-
SHA1
f2ba034713590f6f587ba4fee7420c5bb5ec4b25
-
SHA256
aaba34a7ee00143fff499b219466498253e9fada28358dae6896870aeba84a99
-
SHA512
20bd95a4e4a5598e0f18e1442483c746d92c1f06fedd6df6e1adfba4bb08694cb846e6cd3b655589f8540d376678d2c3400a4b56c69fa5b0a8cb00ad67a38735
-
SSDEEP
24576:e34avxauK03s37QaemGfKvw+RTrsJgjTNHyUt7yQaaPX8Q8p3qkw:E4aHK0837QlmGivw+RToqjTNH5tZaaP/
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes itself
-
Executes dropped EXE
-