General
-
Target
2024-12-12_1a4aabda5a9eab98c95d23f8645b259e_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
664KB
-
Sample
241212-xamlyasrbv
-
MD5
1a4aabda5a9eab98c95d23f8645b259e
-
SHA1
f830cb70e2d2a11513777e860be5ee63289a1d95
-
SHA256
a90acde728d6c6dd358b297e158d530965eb76559ecf260b47e5358a2431f93b
-
SHA512
5e9f6e5048c156a7c29a579a8036fe57830560ef7f27c10983dd784d38aa46b379fbf978092bc8a00a9c9d553cebe71688d2f735051b25bbe533f880bcbec352
-
SSDEEP
12288:uBKKap14LRGQbKqnVWqqPIBONhxsUzEqrBjvrEH70:uBKK/AB/xsUzRRrEH70
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-12_1a4aabda5a9eab98c95d23f8645b259e_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-12_1a4aabda5a9eab98c95d23f8645b259e_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
664KB
-
MD5
1a4aabda5a9eab98c95d23f8645b259e
-
SHA1
f830cb70e2d2a11513777e860be5ee63289a1d95
-
SHA256
a90acde728d6c6dd358b297e158d530965eb76559ecf260b47e5358a2431f93b
-
SHA512
5e9f6e5048c156a7c29a579a8036fe57830560ef7f27c10983dd784d38aa46b379fbf978092bc8a00a9c9d553cebe71688d2f735051b25bbe533f880bcbec352
-
SSDEEP
12288:uBKKap14LRGQbKqnVWqqPIBONhxsUzEqrBjvrEH70:uBKK/AB/xsUzRRrEH70
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-