General

  • Target

    2024-12-12_1a4aabda5a9eab98c95d23f8645b259e_avoslocker_cobalt-strike_floxif_luca-stealer

  • Size

    664KB

  • Sample

    241212-xamlyasrbv

  • MD5

    1a4aabda5a9eab98c95d23f8645b259e

  • SHA1

    f830cb70e2d2a11513777e860be5ee63289a1d95

  • SHA256

    a90acde728d6c6dd358b297e158d530965eb76559ecf260b47e5358a2431f93b

  • SHA512

    5e9f6e5048c156a7c29a579a8036fe57830560ef7f27c10983dd784d38aa46b379fbf978092bc8a00a9c9d553cebe71688d2f735051b25bbe533f880bcbec352

  • SSDEEP

    12288:uBKKap14LRGQbKqnVWqqPIBONhxsUzEqrBjvrEH70:uBKK/AB/xsUzRRrEH70

Malware Config

Targets

    • Target

      2024-12-12_1a4aabda5a9eab98c95d23f8645b259e_avoslocker_cobalt-strike_floxif_luca-stealer

    • Size

      664KB

    • MD5

      1a4aabda5a9eab98c95d23f8645b259e

    • SHA1

      f830cb70e2d2a11513777e860be5ee63289a1d95

    • SHA256

      a90acde728d6c6dd358b297e158d530965eb76559ecf260b47e5358a2431f93b

    • SHA512

      5e9f6e5048c156a7c29a579a8036fe57830560ef7f27c10983dd784d38aa46b379fbf978092bc8a00a9c9d553cebe71688d2f735051b25bbe533f880bcbec352

    • SSDEEP

      12288:uBKKap14LRGQbKqnVWqqPIBONhxsUzEqrBjvrEH70:uBKK/AB/xsUzRRrEH70

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks