General
-
Target
2024-12-13_00b52cc8898b3c6f56361824ec74461a_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
660KB
-
Sample
241213-apgb5strfp
-
MD5
00b52cc8898b3c6f56361824ec74461a
-
SHA1
e5e4ff8cf1b777a05653dfd1ee9060a0c2a2d35d
-
SHA256
e6a79ee379c24a3438e50a59360b29c57401c409403dd63b45b648899812450e
-
SHA512
410aec9d30d24a8147b991ab7215c948bfbe77445f0cac51067b73fe414dde8a6b72e578b3f15df2a8cf956de696179a7eee59ac153b2565018b7f4da8606848
-
SSDEEP
12288:QElbaJ26R2TZszr8jxrMnVWqqPIBONhxsUzMi4BjvrEH7G:QElbasLXX/xsUzvKrEH7G
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-13_00b52cc8898b3c6f56361824ec74461a_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-13_00b52cc8898b3c6f56361824ec74461a_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
660KB
-
MD5
00b52cc8898b3c6f56361824ec74461a
-
SHA1
e5e4ff8cf1b777a05653dfd1ee9060a0c2a2d35d
-
SHA256
e6a79ee379c24a3438e50a59360b29c57401c409403dd63b45b648899812450e
-
SHA512
410aec9d30d24a8147b991ab7215c948bfbe77445f0cac51067b73fe414dde8a6b72e578b3f15df2a8cf956de696179a7eee59ac153b2565018b7f4da8606848
-
SSDEEP
12288:QElbaJ26R2TZszr8jxrMnVWqqPIBONhxsUzMi4BjvrEH7G:QElbasLXX/xsUzvKrEH7G
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-