General
-
Target
2024-12-30_b377dfc83d41be71b9c863c9feba75eb_avoslocker_floxif_luca-stealer_revil
-
Size
4.4MB
-
Sample
241230-ppzwtavqbk
-
MD5
b377dfc83d41be71b9c863c9feba75eb
-
SHA1
cb5f22199de3d7b82ac961a069e899d527445329
-
SHA256
1fdd5df69fa5f2104d472de434cb66680f2c79432b40cb6d5533b39e1e0bd064
-
SHA512
479e4b9eda1fe78cc3d01a244d1100b59fbeff238af0c06214cdab79d03c1735ec51c2e8c8ee0d2693445cc35bc509b25849c6e5ba4b36cf185aca9c9678e5bb
-
SSDEEP
49152:GwC1K4XGGXLKQblnhee2+mGA9b/9PJF9LI0LQ0Cn2z/vGr7GJjju+eTJ/VeSPV3E:GwC13bKFBhQ0C2z/u/GZj2Ey3o1Z/h1h
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-30_b377dfc83d41be71b9c863c9feba75eb_avoslocker_floxif_luca-stealer_revil.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
2024-12-30_b377dfc83d41be71b9c863c9feba75eb_avoslocker_floxif_luca-stealer_revil
-
Size
4.4MB
-
MD5
b377dfc83d41be71b9c863c9feba75eb
-
SHA1
cb5f22199de3d7b82ac961a069e899d527445329
-
SHA256
1fdd5df69fa5f2104d472de434cb66680f2c79432b40cb6d5533b39e1e0bd064
-
SHA512
479e4b9eda1fe78cc3d01a244d1100b59fbeff238af0c06214cdab79d03c1735ec51c2e8c8ee0d2693445cc35bc509b25849c6e5ba4b36cf185aca9c9678e5bb
-
SSDEEP
49152:GwC1K4XGGXLKQblnhee2+mGA9b/9PJF9LI0LQ0Cn2z/vGr7GJjju+eTJ/VeSPV3E:GwC13bKFBhQ0C2z/u/GZj2Ey3o1Z/h1h
-
Floxif family
-
Detects Floxif payload
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-