General

  • Target

    2024-12-12_87db8baebe00d86a92aeb04de4b758e7_avoslocker_cobalt-strike_floxif_luca-stealer

  • Size

    224KB

  • Sample

    241212-x6ydbavmds

  • MD5

    87db8baebe00d86a92aeb04de4b758e7

  • SHA1

    32dbe7a93af2559d643ce7346dc17cc71d0ed5d7

  • SHA256

    114909ec491b9f085c59da72e692d89e3cf626d9975849f09590a41a30849c82

  • SHA512

    303d80182242a36a6fb69743f4b6f857b43cdbfe099747fa7948fe79e2820730afa1076b6fa2b01020c111173b84eabd46241753e8b44ec4113b0b123aced396

  • SSDEEP

    6144:ayO2zi7ajvRcGLKZH2Fat7w9hH4JdBV+UdvrEFp7hKdmBCE:ayO2zi+jv+09hH4JdBjvrEH7JME

Malware Config

Targets

    • Target

      2024-12-12_87db8baebe00d86a92aeb04de4b758e7_avoslocker_cobalt-strike_floxif_luca-stealer

    • Size

      224KB

    • MD5

      87db8baebe00d86a92aeb04de4b758e7

    • SHA1

      32dbe7a93af2559d643ce7346dc17cc71d0ed5d7

    • SHA256

      114909ec491b9f085c59da72e692d89e3cf626d9975849f09590a41a30849c82

    • SHA512

      303d80182242a36a6fb69743f4b6f857b43cdbfe099747fa7948fe79e2820730afa1076b6fa2b01020c111173b84eabd46241753e8b44ec4113b0b123aced396

    • SSDEEP

      6144:ayO2zi7ajvRcGLKZH2Fat7w9hH4JdBV+UdvrEFp7hKdmBCE:ayO2zi+jv+09hH4JdBjvrEH7JME

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks