General
-
Target
2024-12-15_0d10613c3c677e02354cdae9e0cb526f_avoslocker_floxif_hijackloader_luca-stealer
-
Size
1.2MB
-
Sample
241215-x9v3cswldp
-
MD5
0d10613c3c677e02354cdae9e0cb526f
-
SHA1
e249428e7b2d1ddaa1be1d30cf217016d5ee51ae
-
SHA256
a6d97b7494b4b7a51876f0bbedd890a7105a2654ed097535f2e10fdb95812fa2
-
SHA512
067aedc61e35fb7d2cf5f8630215afb82247c067ac6875e2d98a7b47372268c3ac3098e5ad4777f4e5bd4ea403495aa2c14d829b55bf1a0da90c7b61ecd23e57
-
SSDEEP
24576:Uh4cCZBtj/uGZXPR+ihzsoyj2cWBcW5ey+EpiWaKfO8oiXNwrEH7s:U+j/D/zsoyj2cWB3Ey+YiFKfO6N8
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_0d10613c3c677e02354cdae9e0cb526f_avoslocker_floxif_hijackloader_luca-stealer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-12-15_0d10613c3c677e02354cdae9e0cb526f_avoslocker_floxif_hijackloader_luca-stealer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-12-15_0d10613c3c677e02354cdae9e0cb526f_avoslocker_floxif_hijackloader_luca-stealer
-
Size
1.2MB
-
MD5
0d10613c3c677e02354cdae9e0cb526f
-
SHA1
e249428e7b2d1ddaa1be1d30cf217016d5ee51ae
-
SHA256
a6d97b7494b4b7a51876f0bbedd890a7105a2654ed097535f2e10fdb95812fa2
-
SHA512
067aedc61e35fb7d2cf5f8630215afb82247c067ac6875e2d98a7b47372268c3ac3098e5ad4777f4e5bd4ea403495aa2c14d829b55bf1a0da90c7b61ecd23e57
-
SSDEEP
24576:Uh4cCZBtj/uGZXPR+ihzsoyj2cWBcW5ey+EpiWaKfO8oiXNwrEH7s:U+j/D/zsoyj2cWB3Ey+YiFKfO6N8
-
Floxif family
-
Detects Floxif payload
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-