General

  • Target

    2024-12-13_1c53848ea2abd1e536773496cfc123e7_avoslocker_cobalt-strike_floxif_luca-stealer

  • Size

    662KB

  • Sample

    241213-aqql7ssnfw

  • MD5

    1c53848ea2abd1e536773496cfc123e7

  • SHA1

    b6a829ed88699726ac13a65c5f1a7d44d9aafe0c

  • SHA256

    3ffeb1ce81389ee7f551ded16164d1d53d80783cf849b787cdb461c30c7e9eef

  • SHA512

    456237cbe46b0f8bc9b8b36b0675c65e4e4f690c42ab0b5570ca5e9b7f9852ba113721df26fe8dcfca93b828cb023d13dd7d44e39f80c413c3343d13f6b305f8

  • SSDEEP

    12288:9gkJRl603BBKlhPj87HnVWqqPIBONhxsUzb95SBjvrEH7G:9gkJPlbm/xsUzPUrEH7G

Malware Config

Targets

    • Target

      2024-12-13_1c53848ea2abd1e536773496cfc123e7_avoslocker_cobalt-strike_floxif_luca-stealer

    • Size

      662KB

    • MD5

      1c53848ea2abd1e536773496cfc123e7

    • SHA1

      b6a829ed88699726ac13a65c5f1a7d44d9aafe0c

    • SHA256

      3ffeb1ce81389ee7f551ded16164d1d53d80783cf849b787cdb461c30c7e9eef

    • SHA512

      456237cbe46b0f8bc9b8b36b0675c65e4e4f690c42ab0b5570ca5e9b7f9852ba113721df26fe8dcfca93b828cb023d13dd7d44e39f80c413c3343d13f6b305f8

    • SSDEEP

      12288:9gkJRl603BBKlhPj87HnVWqqPIBONhxsUzb95SBjvrEH7G:9gkJPlbm/xsUzPUrEH7G

    • Floxif family

    • Floxif, Floodfix

      Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

    • Detects Floxif payload

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks