General
-
Target
2024-12-21_c44c2d06a83acb63564878a7a23d2ce1_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
224KB
-
Sample
241221-aqr52axpat
-
MD5
c44c2d06a83acb63564878a7a23d2ce1
-
SHA1
dfc77e7a73c2fbfb0db20fcce0d062508f725102
-
SHA256
dd10fb5b2fe65af7d7ae23dd2252d181faf4d5b796f59dc5c5278a936597f39b
-
SHA512
f40b91476f27475e3ce12b41c2c7251c96529ede951c2ea1d223d6d7912062a0b719bb87fd2aabac16fea20c8bbd2e9cbc1e91e807819ae2f801d85c0e2feb90
-
SSDEEP
6144:ayU2zi7ajvRcGdJw9hH4JdBV+UdvrEFp7hK9Z:ayU2zi+jvPu9hH4JdBjvrEH7A
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-21_c44c2d06a83acb63564878a7a23d2ce1_avoslocker_cobalt-strike_floxif_luca-stealer.exe
Resource
win7-20241023-en
Malware Config
Targets
-
-
Target
2024-12-21_c44c2d06a83acb63564878a7a23d2ce1_avoslocker_cobalt-strike_floxif_luca-stealer
-
Size
224KB
-
MD5
c44c2d06a83acb63564878a7a23d2ce1
-
SHA1
dfc77e7a73c2fbfb0db20fcce0d062508f725102
-
SHA256
dd10fb5b2fe65af7d7ae23dd2252d181faf4d5b796f59dc5c5278a936597f39b
-
SHA512
f40b91476f27475e3ce12b41c2c7251c96529ede951c2ea1d223d6d7912062a0b719bb87fd2aabac16fea20c8bbd2e9cbc1e91e807819ae2f801d85c0e2feb90
-
SSDEEP
6144:ayU2zi7ajvRcGdJw9hH4JdBV+UdvrEFp7hK9Z:ayU2zi+jvPu9hH4JdBjvrEH7A
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-