General
-
Target
2024-12-28_f4420c838459cf2aecec7fddea96930f_avoslocker_floxif_hijackloader_luca-stealer
-
Size
1.4MB
-
Sample
241228-dxt5ravrbk
-
MD5
f4420c838459cf2aecec7fddea96930f
-
SHA1
97413fc94b2703edc45e54c7fc033632aacf99c9
-
SHA256
fcb0a07d1962681f24deebc0902fe1fd3583902895a8e73490ececdf7563e39a
-
SHA512
15c3da914192a9eda8e7dafd2a86edc9e5d066f9ec5268a6a4164434fdd77dccd9bed639995a404c3aad55018253fec722878ba44b2292065f8688fc3571d54e
-
SSDEEP
24576:umpsOt65GmrDOW4hRgp/Iwj+iYXAm5j+5oV0OqerwrEH7o:umpsX5zyWyRC/IwjoXAej+54dqerY
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-28_f4420c838459cf2aecec7fddea96930f_avoslocker_floxif_hijackloader_luca-stealer.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-28_f4420c838459cf2aecec7fddea96930f_avoslocker_floxif_hijackloader_luca-stealer
-
Size
1.4MB
-
MD5
f4420c838459cf2aecec7fddea96930f
-
SHA1
97413fc94b2703edc45e54c7fc033632aacf99c9
-
SHA256
fcb0a07d1962681f24deebc0902fe1fd3583902895a8e73490ececdf7563e39a
-
SHA512
15c3da914192a9eda8e7dafd2a86edc9e5d066f9ec5268a6a4164434fdd77dccd9bed639995a404c3aad55018253fec722878ba44b2292065f8688fc3571d54e
-
SSDEEP
24576:umpsOt65GmrDOW4hRgp/Iwj+iYXAm5j+5oV0OqerwrEH7o:umpsX5zyWyRC/IwjoXAej+54dqerY
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-