General
-
Target
2024-12-12_a1dfd07a6554890ad8fca1938f61c937_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
461KB
-
Sample
241212-x8qq9axjdp
-
MD5
a1dfd07a6554890ad8fca1938f61c937
-
SHA1
c0b42d4136eb4fe3f18cdda001bfe9270f8be8fc
-
SHA256
0b7afe023e964eadb28c88d358eaef0ed083a3ede1a38580fe60c144c9068e13
-
SHA512
53b94accb1a2c23cd249aa167e862b9ab67dcdf35728f3b8fabe2130764ecf2438cda7618c5e60c0235a9ab38481ca12839170cca8920452c53bbea1c97b46d5
-
SSDEEP
12288:SJRL3U2b6U38Y9de3ANbCS0Z8MfsVqrxenVWqqPIBONhxs8hmhSBjvrEH75:SJRL3Lp9dNNbCiMfsVi1/xs8hmCrEH75
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-12_a1dfd07a6554890ad8fca1938f61c937_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-12_a1dfd07a6554890ad8fca1938f61c937_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
461KB
-
MD5
a1dfd07a6554890ad8fca1938f61c937
-
SHA1
c0b42d4136eb4fe3f18cdda001bfe9270f8be8fc
-
SHA256
0b7afe023e964eadb28c88d358eaef0ed083a3ede1a38580fe60c144c9068e13
-
SHA512
53b94accb1a2c23cd249aa167e862b9ab67dcdf35728f3b8fabe2130764ecf2438cda7618c5e60c0235a9ab38481ca12839170cca8920452c53bbea1c97b46d5
-
SSDEEP
12288:SJRL3U2b6U38Y9de3ANbCS0Z8MfsVqrxenVWqqPIBONhxs8hmhSBjvrEH75:SJRL3Lp9dNNbCiMfsVi1/xs8hmCrEH75
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-