General

  • Target

    2024-12-12_a1dfd07a6554890ad8fca1938f61c937_avoslocker_cobalt-strike_floxif_luca-stealer

  • Size

    461KB

  • Sample

    241212-ybtmbaxkdp

  • MD5

    a1dfd07a6554890ad8fca1938f61c937

  • SHA1

    c0b42d4136eb4fe3f18cdda001bfe9270f8be8fc

  • SHA256

    0b7afe023e964eadb28c88d358eaef0ed083a3ede1a38580fe60c144c9068e13

  • SHA512

    53b94accb1a2c23cd249aa167e862b9ab67dcdf35728f3b8fabe2130764ecf2438cda7618c5e60c0235a9ab38481ca12839170cca8920452c53bbea1c97b46d5

  • SSDEEP

    12288:SJRL3U2b6U38Y9de3ANbCS0Z8MfsVqrxenVWqqPIBONhxs8hmhSBjvrEH75:SJRL3Lp9dNNbCiMfsVi1/xs8hmCrEH75

Malware Config

Targets

    • Target

      2024-12-12_a1dfd07a6554890ad8fca1938f61c937_avoslocker_cobalt-strike_floxif_luca-stealer

    • Size

      461KB

    • MD5

      a1dfd07a6554890ad8fca1938f61c937

    • SHA1

      c0b42d4136eb4fe3f18cdda001bfe9270f8be8fc

    • SHA256

      0b7afe023e964eadb28c88d358eaef0ed083a3ede1a38580fe60c144c9068e13

    • SHA512

      53b94accb1a2c23cd249aa167e862b9ab67dcdf35728f3b8fabe2130764ecf2438cda7618c5e60c0235a9ab38481ca12839170cca8920452c53bbea1c97b46d5

    • SSDEEP

      12288:SJRL3U2b6U38Y9de3ANbCS0Z8MfsVqrxenVWqqPIBONhxs8hmhSBjvrEH75:SJRL3Lp9dNNbCiMfsVi1/xs8hmCrEH75

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks